"Infect-me-not": A user-centric and site-centric study of web-based malware
نویسندگان
چکیده
Malware authors have been using websites to distribute their products as a way to evade spam filters and classic anti-virus engines. Yet there has been relatively little work in modeling the behaviors and temporal properties of websites, as most research focuses on detecting whether a website distributes malware. In this paper we ask: How does web-based malware spread? We conduct an extensive study and follow a websitecentric and user-centric point of view. We collect data from four online databases, including Symantec’s WINE Project, for a total of more than 600K malicious URLs and over 500K users. First, we find that legitimate but compromised websites constitute 33.1% of the malicious websites in our dataset. In order to conduct this study, we develop a classifier to distinguish between compromised vs. malicious websites with an accuracy of 95.3%, which could be of interest to studies on website profiling. Second, we find that malicious URLs can be surprisingly long-lived, with 10% of malicious sites staying active for three months or more. Third, we observe that a significant number of URLs exhibit the same temporal pattern that suggests a flush-crowd behavior, inflicting most of their damage during the first few days of appearance. Finally, the distribution of the visits to malicious sites per user is skewed, with 1.4% of users visiting more than 10 malicious sites in 8 months. Our study is a first step towards modeling webbased malware propagation as a network-wide phenomenon and enabling researchers to develop realistic assumptions and
منابع مشابه
Convergence of Desktop and Web Applications on a Multi-Service OS
A paradigm shift has been taking place in the personal computer sharing model: a computer is no longer shared by users, but shared by mutually distrusting applications or other content. This multi-application sharing model is mismatched with today’s multi-user operating systems like Windows and Linux, which offer protection only across users. This mismatch contributes significantly to today’s m...
متن کاملExploring a New World of Identity with Identity 2.0 based Solutions
On the Internet today, account registration is nearly always a requirement to interact with any website in a meaningful way. Each digital identity a user creates is a new and completely disjoint identity from all other existing digital identities of the user. These traditional identities, Identity 1.0 identities, are site-centric and centralized. Alternatively, Identity 2.0 identity solutions a...
متن کاملEffect of Centric, Assisted Non-Working, and Unassisted Non-Working Interferences on Temporomandibular Disorders
Background and Aim: Temporomandibular disorder (TMD) is a multifactorial problem caused by many reasons. There is still controversy about the effect of different types of occlusal disorder on TMD. This study was designed to determine the effects of centric and assisted and unassisted non-working interferences on TMD. Materials and Methods: In this cross-sectional study, 100 dental students, in...
متن کاملA Service for Aggregating and Interpreting Contextual Information
contextaware computing, Me-Centric computing, ontology, reasoning, web services, semantic web We present an architectural support for building context-aware applications. With the increasing acceptance of dynamic mobile and ubiquitous computing environments, applications are no longer limited to relying only on the information explicitly provided by users. Instead, these environments invite a n...
متن کاملTowards User-Centric Cross-Site Personalisation
Personalisation on the web is mostly confined to Websites of online content providers. The main drawback of this approach is the missing consideration of the users previous cross-site browsing experience resulting in an often fragmented browsing experience. This paper introduces a service driven architecture for user-centric personalisation in online cross-site tasks. We introduce the proposed ...
متن کامل