Significant Factors for Detecting Malicious Redirections

被引:0
|
作者
Hans, Kanchan [1 ]
Ahuja, Laxmi
Muttoo, S. K.
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, India
关键词
redirection spam; malicious redirection; redirection attack; spam detection; factors;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Malicious redirections refer to a technique where a genuine search user is befooled and made to pass through a chain of redirections and ultimately presented with a compromised web page that may be an adware or an irrelevant content for the user. As a consequence the search engines earn a bad name in quality information retrieval and moreover the users are too dissatisfied. Also, there is sever wastage of expensive network resources like bandwidth. Detecting these malicious redirections is important for quality information retrieval from web. But detecting such redirections is a very tedious task due to the genuine usage of redirections. Also, the conventional methods of spam detection such as blacklists, whitelists are not very successful as they need to be updated every time. This paper explores various reasons behind redirections and presents the redirection attack scenario. To design a more robust and reliable approach, we present some new factors that facilitate redirection spam detection. We also explored the operational profile of each identified factor along with the criteria for its selection.
引用
收藏
页码:499 / 502
页数:4
相关论文
共 50 条
  • [41] Malware Analysis: The Art of Detecting Malicious Activities
    El-moussa, Fadi
    Jones, Andy
    [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 51 - 59
  • [42] Detecting malicious Java']JavaScript code in Mozilla
    Hallaraker, O
    Vigna, G
    [J]. ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 85 - 94
  • [43] On the feasibility of detecting injections in malicious npm packages
    Scalco, Simone
    Duc-Ly Vu
    Paramitha, Ranindya
    Massacci, Fabio
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [44] DETECTING AND CONTAINING MALICIOUS SERVICES IN AN INTERCLOUD ENVIRONMENT
    Kapoor, Lohit
    Bawa, Seema
    Gupta, Ankur
    [J]. JOURNAL OF WEB ENGINEERING, 2016, 15 (5-6): : 521 - 538
  • [45] Detecting malicious activities through port profiling
    Iguchi, M
    Goto, S
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1999, E82D (04): : 784 - 792
  • [46] PLATPAL: Detecting Malicious Documents with Platform Diversity
    Xu, Meng
    Kim, Taesoo
    [J]. PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 271 - 287
  • [47] Detecting Malicious URLs Using Lexical Analysis
    Mamun, Mohammad Saiful Islam
    Rathore, Mohammad Ahmad
    Lashkari, Arash Habibi
    Stakhanova, Natalia
    Ghorbani, Ali A.
    [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 467 - 482
  • [48] Detecting malicious peers in overlay multicast streaming
    Shetty, Samarth
    Galdames, Patricio
    Tavanapong, Wallapak
    Cai, Ying
    [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 499 - +
  • [49] Detecting algorithmically generated malicious domain names
    Department of Electrical and Computer Engineering, Texas A and M University, College Station, TX 77843, United States
    不详
    [J]. Proc. ACM SIGCOMM Internet Meas. Conf. IMC, (48-61):
  • [50] Detecting Malicious Domains via Graph Inference
    Manadhata, Pratyusa K.
    Yadav, Sandeep
    Rao, Prasad
    Horne, William
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 1 - 18