Detecting Drive-by Download Attacks from Proxy Log Information using Convolutional Neural Network

نویسندگان

  • Masayuki Murata
  • Kohei Yamanishi
چکیده

Many hosts are still infected by drive-by download attacks despite the efforts of many security researchers and venders. In the drive-by download attacks, the attackers maliciously change popular web sites. Then, the users are redirected via the redirect URLs to the exploit URLs. At the exploit URLs, an exploit code is executed, and malware is downloaded from malware distribution URLs [1]. By using the redirections via multiple URLs, which is called a redirection chain, the attacker can separate functions such as redirections and attack. As a result, the attacker can easily change the URLs for the redirections and attack in a short time, which makes it difficult for researchers and vendors to analyize them [1]. Blacklists including URLs and domains related to malicious web sites are widely implemented [2]. The blacklists are created by using honeyclients [3], which have decoy browsers. However, the URLs used for attacks are frequently changed. Thus, there may be many web sites that are used by the drive-by download attacks but are not included in the blacklists. When a drive-by download attack occurs, the corresponding URL sequence includes the redirection chain. In this thesis, we focus on the features of the URL sequences, including the features of malicious URLs and their order. We propose the method to detect drive-by download attacks using the convolutional neural network (CNN), which achieves high accuracy in the field of analyzing sequence data [4]. In addition to simply applying CNNs, we introduce an Event De-noising CNN (EDCNN) [5], which is a neural network extended from the CNN so as to mitigate the impact of the benign URLs included in the URL sequence. To detect drive-by download attacks from the proxy logs, we need to consider the case that multiple web sites are accessed simultaneously. In this case, the URL sequence includes the URLs

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Fake Websites Using Swarm Intelligence Mechanism in Human Learning

The internet and its various services have made users to easily communicate with each other. Internet benefits including online business and e-commerce. E-commerce has boosted online sales and online auction types. Despite their many uses and benefits, the internet and their services have various challenges, such as information theft, which challenges the use of these services. Information thef...

متن کامل

A multi-scale convolutional neural network for automatic cloud and cloud shadow detection from Gaofen-1 images

The reconstruction of the information contaminated by cloud and cloud shadow is an important step in pre-processing of high-resolution satellite images. The cloud and cloud shadow automatic segmentation could be the first step in the process of reconstructing the information contaminated by cloud and cloud shadow. This stage is a remarkable challenge due to the relatively inefficient performanc...

متن کامل

A Two-Dimensional Convolutional Neural Network for Brain Tumor Detection From MRI

Aims: Cancerous brain tumors are among the most dangerous diseases that lower the quality of life of people for many years. Their detection in the early stages paves the way for the proper treatment. The present study aimed to present a two-dimensional Convolutional Neural Network (CNN) for detecting brain tumors under Magnetic Resonance Imaging (MRI) using the deep learning method. Methods & ...

متن کامل

ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks

Despite the convenience brought by the advances in web and Internet technology, users are increasingly being exposed to the danger of various types of cyber attacks. In particular, recent studies have shown that today’s cyber attacks usually occur on the web via malware distribution and the stealing of personal information. A drive-by download is a kind of web-based attack for malware distribut...

متن کامل

Provide a Deep Convolutional Neural Network Optimized with Morphological Filters to Map Trees in Urban Environments Using Aerial Imagery

Today, we cannot ignore the role of trees in the quality of human life, so that the earth is inconceivable for humans without the presence of trees. In addition to their natural role, urban trees are also very important in terms of visual beauty. Aerial imagery using unmanned platforms with very high spatial resolution is available today. Convolutional neural networks based deep learning method...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017