Effective Analysis, Characterization, and Detection of Malicious Web Pages

被引:0
作者
Eshete, Birhanu [1 ]
机构
[1] Fdn Bruno Kessler, Trento, Italy
来源
PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION) | 2013年
关键词
malicious web pages; web-based attacks; effective detection; static analysis; dynamic analysis; machine learning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The steady evolution of the Web has paved the way for miscreants to take advantage of vulnerabilities to embed malicious content into web pages. Up on a visit, malicious web pages steal sensitive data, redirect victims to other malicious targets, or cease control of victim's system to mount future attacks. Approaches to detect malicious web pages have been reactively effective at special classes of attacks like drive-by-downloads. However, the prevalence and complexity of attacks by malicious web pages is still worrisome. The main challenges in this problem domain are (1) fine-grained capturing and characterization of attack payloads (2) evolution of web page artifacts and (3) flexibility and scalability of detection techniques with a fast-changing threat landscape. To this end, we proposed a holistic approach that leverages static analysis, dynamic analysis, machine learning, and evolutionary searching and optimization to effectively analyze and detect malicious web pages. We do so by: introducing novel features to capture fine-grained snapshot of malicious web pages, holistic characterization of malicious web pages, and application of evolutionary techniques to fine-tune learning-based detection models pertinent to evolution of attack payloads. In this paper, we present key intuition and details of our approach, results obtained so far, and future work.
引用
收藏
页码:355 / 359
页数:5
相关论文
共 28 条
  • [1] ALEXANDER M, 2007, PROCEEDINGS OF 16TH
  • [2] [Anonymous], 2011, P 20 INT C WORLD WID
  • [3] BYUNGIK K, 2011, INT J ADV SCI TECHNO, P19
  • [4] Choi H., 2011, WebApps, V11, P11
  • [5] Dewald Andreas., 2010, Proceedings of the 2010 Symposium on Applied Computing (SAC), P1859
  • [6] ESHETE B, 2012, PROCEEDINGS OF SECUR
  • [7] ESHETE B, 2012, TECHNICAL REPORT
  • [8] *GOOGL, 2011, GOOGLE SAFE BROWSING
  • [9] Hall M., 2009, SIGKDD Explorations, V11, P10, DOI DOI 10.1145/1656274.1656278
  • [10] Malicious web content detection by machine learning
    Hou, Yung-Tsung
    Chang, Yimeng
    Chen, Tsuhan
    Laih, Chi-Sung
    Chen, Chia-Mei
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (01) : 55 - 60