Solution for Deceptive Download Buttons and Drive-By Installation
نویسندگان
چکیده
منابع مشابه
A Lightweight Drive-by Download Simulator
Teaching students about practical security can be a challenge in laboratories that are, by necessity, isolated from the Internet. We describe some preliminary work to address this problem for the topic of drive-by downloads. A previous system, the Spamulator, allowed students’ real, non-contrived code to interact with a simulation of the Internet, simulating up to a million domains on a single ...
متن کاملAnatomy of Drive-by Download Attack
Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques to classify web pages as malicious or benign have been proposed in the literature. However, each proposed method uses different content feature...
متن کاملMeasuring Drive-by Download Defense in Depth
Defense in depth is vital as no single security product detects all of today’s attacks. To design defense in depth organizations rely on best practices and isolated product reviews with no way to determine the marginal benefit of additional security products. We propose empirically testing security products’ detection rates by linking multiple pieces of data such as network traffic, executable ...
متن کاملMitigating Drive-By Download Attacks: Challenges and Open Problems
Malicious web sites perform drive-by download attacks to infect their visitors with malware. Current protection approaches rely on blackor whitelisting techniques that are difficult to keep up-to-date. As todays drive-by attacks already employ encryption to evade network level detection we propose a series of techniques that can be implemented in web browsers to protect the user from such threa...
متن کاملDrive-by Download Attacks: Effects and Detection Methods
The aim of this study is to present and analyze the problem of drive-by download attacks. Drive-by downloads have become one of the most common ways to infect a large group of unsuspected users. Attackers take full advantage of the functionality of the Internet and its dominance in various transactions of everyday life and spread malware by exploiting vulnerable systems for financial gain. Thes...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of System Modeling and Simulation
سال: 2018
ISSN: 2518-0959
DOI: 10.24178/ijsms.2018.3.4.01