Significant Factors for Detecting Malicious Redirections

被引:0
|
作者
Hans, Kanchan [1 ]
Ahuja, Laxmi
Muttoo, S. K.
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, India
关键词
redirection spam; malicious redirection; redirection attack; spam detection; factors;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Malicious redirections refer to a technique where a genuine search user is befooled and made to pass through a chain of redirections and ultimately presented with a compromised web page that may be an adware or an irrelevant content for the user. As a consequence the search engines earn a bad name in quality information retrieval and moreover the users are too dissatisfied. Also, there is sever wastage of expensive network resources like bandwidth. Detecting these malicious redirections is important for quality information retrieval from web. But detecting such redirections is a very tedious task due to the genuine usage of redirections. Also, the conventional methods of spam detection such as blacklists, whitelists are not very successful as they need to be updated every time. This paper explores various reasons behind redirections and presents the redirection attack scenario. To design a more robust and reliable approach, we present some new factors that facilitate redirection spam detection. We also explored the operational profile of each identified factor along with the criteria for its selection.
引用
收藏
页码:499 / 502
页数:4
相关论文
共 50 条
  • [1] Detecting Malicious HTTP Redirections Using Trees of User Browsing Activity
    Mekky, Hesham
    Torrest, Ruben
    Zhang, Zhi-Li
    Saha, Sabyasachi
    Nucci, Antonio
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1159 - 1167
  • [2] Hidden Path: Understanding the Intermediary in Malicious Redirections
    Zeng, Yuwei
    Liu, Zhicheng
    Chen, Xunxun
    Zang, Tianning
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1725 - 1740
  • [3] REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic
    Burgess, Jonah
    Carlin, Domhnall
    O'Kane, Philip
    Sezer, Sakir
    [J]. 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [4] Detecting malicious SQL
    Fonseca, Jose
    Vieira, Marco
    Madeira, Henrique
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 259 - +
  • [5] A Visual Analytics Approach to Detecting Server Redirections and Data Exfiltration
    Wang, Weijie
    Yang, Baijian
    Chen, Victor Yingjie
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 13 - 18
  • [6] Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
    Kalafut, Andrew J.
    Shue, Craig A.
    Gupta, Minaxi
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [7] Detecting Malicious Packet Losses
    Mizrak, Alper T.
    Savage, Stefan
    Marzullo, Keith
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (02) : 191 - 206
  • [8] Characterizing and Detecting Malicious Crowdsourcing
    Wang, Tianyi
    Wang, Gang
    Li, Xing
    Zheng, Haito
    Zhao, Ben Y.
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) : 537 - 538
  • [9] Detecting Targeted Malicious Email
    Amin, Rohan M.
    Ryan, Julie J. C. H.
    van Dorp, J. Rene
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (03) : 64 - 71
  • [10] Detecting malicious groups of agents
    Braynov, S
    Jadliwala, M
    [J]. 2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 90 - 99