A multidimensional analysis of malicious and compromised websites. (Plusieurs axes d'analyse de sites web compromis et malicieux)
نویسنده
چکیده
The World Wide Web has become necessary to the lives of hundreds of millions of people, has allowed society to create new jobs, new marketplaces, new leisure activities as well as new ways of sharing information and money. Unfortunately, however, the web is also attracting more and more criminals who see it as a new means of making money and abusing people’s property and services for their own benefit. The World Wide Web is today a very complex ecosystem: for this reason, also attacks that take place on the Internet can be very complex in nature, and different from each other. In general, however, web attacks involve four main actors, namely the attackers, the vulnerable websites hosted on the premises of hosting providers, the web users who end up being victims of attacks, and the security companies and researchers who are involved in monitoring the Internet and in trying to spot and fight malicious or compromised websites. In this dissertation, we perform a multidimensional analysis of attacks involving malicious or compromised websites. In particular, the focus of our work is to observe the phenomenon of compromised and malicious websites from the point of view of the four actors that are involved in web attacks: attackers, hosting providers, web users and security companies. Although the study of malicious code on the web is a rather common subject in contemporary computer security literature, our approach based on observing the phenomenon from the points of view of its multiple actors is totally novel, and had never been adopted before. In particular, we first analyze web attacks from a hosting provider’s point of view, showing that current state-of-the-art security measures should allow most providers to detect simple signs of compromise on their customers’ websites. However, as we will show in this dissertation, most hosting providers appear to fail in applying even these basic security practices. Second, we switch our point of view on the attackers, by studying their modus operandi and their goals in a large distributed experiment involving the collection of attacks performed against hundreds of vulnerable web sites. Third, we observe the behavior of victims of web attacks, based on the analysis of web browsing habits of the customers of a big security company. This allows us to understand if it would be feasible to build risk profiles for web users, somehow similarly to what car insurance companies do for their customers.
منابع مشابه
Representing a method to identify and contrast with the fraud which is created by robots for developing websites’ traffic ranking
With the expansion of the Internet and the Web, communication and information gathering between individual has distracted from its traditional form and into web sites. The World Wide Web also offers a great opportunity for businesses to improve their relationship with the client and expand their marketplace in online world. Businesses use a criterion called traffic ranking to determine their si...
متن کامل"Infect-me-not": A user-centric and site-centric study of web-based malware
Malware authors have been using websites to distribute their products as a way to evade spam filters and classic anti-virus engines. Yet there has been relatively little work in modeling the behaviors and temporal properties of websites, as most research focuses on detecting whether a website distributes malware. In this paper we ask: How does web-based malware spread? We conduct an extensive s...
متن کاملWebsite Forensic Investigation to Identify Evidence and Impact of Compromise
Compromised websites that redirect users to malicious websites are often used by attackers to distribute malware. These attackers compromise popular websites and integrate them into a drive-by download attack scheme to lure unsuspecting users to malicious websites. An incident response organization such as a CSIRT contributes to preventing the spread of malware infection by analyzing compromise...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملPoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks
Through injecting dynamic script codes into compromised websites, attackers have widely launched search poisoning attacks to achieve their malicious goals, such as spreading spam or scams, distributing malware and launching drive-by download attacks. While most current related work focuses on measuring or detecting specific search poisoning attacks in the crawled dataset, it is also meaningful ...
متن کامل