VILEEAR: Detection of Drive by Download attack on Malicious Web Pages
نویسندگان
چکیده
Internet is a platform which is mostly used to spread malicious software and viruses on the network. The drive by download (DBD) is most successful and popular attack invented by web site attacker till date. Drive by download attack enables the victims to click coded malicious links and the browser will be redirected to malicious web sites to exploit vulnerabilities, and also it installs software from internet that can be harmful for victim`s machine. Script code embedded in plug-in are commonly used by attacker to execute drive-by download attack which is capable to exploit victim`s system vulnerabilities. Thus it is most challenging and important to find solutions that will detect and mitigate DBD attack. To Detect Drive by download attack is biggest challenge since there is tremendous growth of number of pages hosted on the web. So it is tedious to find small portion of malware network from web and detect whether the web page is harmful or not. In this paper we have proposed an enhanced mechanism called VILEEAR to detect Drive-by download attack. This system will locate and thoroughly analyze the web pages in malware distribution network (MDN) to detect DBD attack. The system will work like a supervised learning process for finding malicious web page in an MDN and will keep on improving the process to detect DBD attack after each iteration.
منابع مشابه
Anatomy of Drive-by Download Attack
Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques to classify web pages as malicious or benign have been proposed in the literature. However, each proposed method uses different content feature...
متن کاملAnalyzing new features of infected web content in detection of malicious web pages
Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious web pages, we propose and analyze a novel set of features including HTML, JavaScript (jQuery...
متن کاملEscape from Monkey Island: Evading High-Interaction Honeyclients
High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools, which, in most cases, is to identify the side-effects of a successful attack rather than the attack itself, leaves open the possibility for malicious pages to perform evasion techniques that allow one to execute an attack wit...
متن کاملAnalysing web-based malware behaviour through client honeypots
With an increase in the use of the internet, there has been a rise in the number of attacks on servers. These attacks can be successfully defended against using security technologies such as firewalls, IDS and anti-virus software, so attackers have developed new methods to spread their malicious code by using web pages, which can affect many more victims than the traditional approach. The attac...
متن کاملWebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths
Most modern malware download attacks occur via the browser, typically due to social engineering and driveby downloads. In this paper, we study the “origin” of malware download attacks experienced by real network users, with the objective of improving malware download defenses. Specifically, we study the web paths followed by users who eventually fall victim to different types of malware downloa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015