Website Forensic Investigation to Identify Evidence and Impact of Compromise
نویسندگان
چکیده
Compromised websites that redirect users to malicious websites are often used by attackers to distribute malware. These attackers compromise popular websites and integrate them into a drive-by download attack scheme to lure unsuspecting users to malicious websites. An incident response organization such as a CSIRT contributes to preventing the spread of malware infection by analyzing compromised websites reported by users and sending abuse reports with detected URLs to webmasters. However, these abuse reports with only URLs are not sufficient to clean up the websites; therefore, webmasters cannot respond appropriately to the report with just URLs. In addition, it is difficult to analyze malicious websites across different client environments, i.e., a CSIRT and a webmaster, because these websites change behavior depending on a client environment. To expedite compromised website clean-up, it is important to provide fine-grained information such as the precise position of compromised web content, malicious URL relations, and the target range of client environments. In this paper, we propose a method of constructing a redirection graph with context, such as which web content redirects to which malicious websites. Our system with the proposed method analyzes a website in a multi-client environment to identify which client environment is exposed to threats. We evaluated our system using crawling datasets of approximately 2,000 compromised websites. As a result, our system successfully identified compromised web content and malicious URL relations, and the amount of web content and the number of URLs to be analyzed were sufficient for incident responders by 0.8% and 15.0%, respectively. Furthermore, it also can identify the target range of client environments in 30.4% of websites and a vulnerability that has been used in malicious websites by leveraging the target information. This fine-grained information identified with our system would dramatically makes the daily work of incident responders more efficient.
منابع مشابه
Network intrusion investigation - Preparation and challenges
As new legislation is written mandating notification of affected parties following the compromise of confidential data, reliable investigative procedures into unauthorized access of such data assume increasing importance. The increasing costs and penalties associated with exposure of sensitive data can be mitigated through forensic preparation and the ability to employ digital forensics. A case...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملThe Impact of Trade Liberalization on Industrial Growth of India: An Empirical Investigation
This paper examines impact of trade liberalization on industrial growth of India. The research problem is expressed as âTo what extent does trade liberalization or openness of the economy influence industrial growth of India?â To identify the impacts of trade liberalization, total time period, 1970-2010, is divided into two sub periods of before trade liberalization i.e. (1970 to 1990) an...
متن کاملInvestigation the impact of US Unilateral Withdraw from JCPOA on the Market Return of Export-Oriented Companies listed on Tehran Stock Exchange by Emphasis on herding Behavior (semi-parametric approach)
Today, export-oriented companies are very important. These companies need a lot of investment to expand their activities, which is one of the best ways to finance the stock market and since market return is one of the factors influencing people's decisions to direct their capital to this market return. Therefore, the analysis of factors affecting this market return is importants and hence the m...
متن کاملA Case of Fifth Metacarpal Neck Fracture
Aims: Determining the impact mechanism is one of the most important measures in forensic science. The mechanism of fracture of the metacarpal neck is squeezed directly into the fist. Often, this type of fracture is due to the impact of the first depending on the hard. In this study, we introduce a case of this fracture. Patient’s Information: He was a middle-aged man, who had ache with various ...
متن کامل