Detecting and Characterizing Malicious Websites

نویسندگان

  • Hugh B. Maynard
  • Zhenxin Zhan
  • Qingji Zheng
  • Weiliang Luo
  • Li Xu
چکیده

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Problem Statement and Research Motivation . . . . . . . . . . . . . . . . . . . . . 1 1.2 Dissertation Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2: Data Collection, Pre-Processing and Feature Definitions . . . . . . . . . . . 4 2.1 Data Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.2 Data Pre-Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.3 Data Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.3.1 Application-Layer Features . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.3.2 Network-Layer Features . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.4 Effectiveness Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Chapter 3: Cross-layer Detection of Malicious Websites . . . . . . . . . . . . . . . . . . 15 3.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Fake Websites Using Swarm Intelligence Mechanism in Human Learning

The internet and its various services have made users to easily communicate with each other. Internet benefits including online business and e-commerce. E-commerce has boosted online sales and online auction types. Despite their many uses and benefits, the internet and their services have various challenges, such as information theft, which challenges the use of these services. Information thef...

متن کامل

Method for Detecting Core Malware Sites Related to Biomedical Information Systems

Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses...

متن کامل

Interactive Website Filter for Safe Web Browsing

Though popularly used for safe web browsing, blacklist-based filters have fundamental limitation in the “window of vulnerability”, the time between malicious website launch and blacklist update. An effective way of seamless protection is to use an add-on filter based on heuristics, but most of prior heuristics have offered the limited scope of protection against new attacks. Moreover, they have...

متن کامل

"Infect-me-not": A user-centric and site-centric study of web-based malware

Malware authors have been using websites to distribute their products as a way to evade spam filters and classic anti-virus engines. Yet there has been relatively little work in modeling the behaviors and temporal properties of websites, as most research focuses on detecting whether a website distributes malware. In this paper we ask: How does web-based malware spread? We conduct an extensive s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014