메뉴 건너뛰기




Volumn 7967 LNCS, Issue , 2013, Pages 1-20

Driving in the cloud: An analysis of drive-by download operations and abuse reporting

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD HOSTING; DISTRIBUTION VECTORS; DRIVE-BY DOWNLOADS; MALWARE FAMILIES; MALWARES; OPERATIONAL ANALYSIS;

EID: 84881183138     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-39235-1_1     Document Type: Conference Paper
Times cited : (70)

References (49)
  • 2
    • 38149089416 scopus 로고    scopus 로고
    • Automated classification and analysis of internet malware
    • Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
    • Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178-197. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4637 , pp. 178-197
    • Bailey, M.1    Oberheide, J.2    Andersen, J.3    Mao, Z.M.4    Jahanian, F.5    Nazario, J.6
  • 4
    • 84869388520 scopus 로고    scopus 로고
    • Manufacturing compromise: The emergence of exploit-as-a-service
    • Grier, C., et al.: Manufacturing compromise: The emergence of exploit-as-a-service. In: CCS (2012)
    • (2012) CCS
    • Grier, C.1
  • 5
    • 85064176806 scopus 로고    scopus 로고
    • Measuring pay-per-install: The commoditization of malware distribution
    • Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring pay-per-install: The commoditization of malware distribution. In: USENIX Security (2011)
    • (2011) USENIX Security
    • Caballero, J.1    Grier, C.2    Kreibich, C.3    Paxson, V.4
  • 6
    • 84881180992 scopus 로고    scopus 로고
    • Caida. As ranking (2012), http://as-rank.caida.org
    • (2012) As Ranking
  • 7
    • 84893029133 scopus 로고    scopus 로고
    • The role of web hosting providers in detecting compromised websites
    • Canali, D., Balzarotti, D., Francillon, A.: The role of web hosting providers in detecting compromised websites. In: WWW (2013)
    • (2013) WWW
    • Canali, D.1    Balzarotti, D.2    Francillon, A.3
  • 8
    • 85084097075 scopus 로고    scopus 로고
    • Insights from the inside: A view of botnet management from infiltration
    • Cho, C.Y., Caballero, J., Grier, C., Paxson, V., Song, D.: Insights from the inside: A view of botnet management from infiltration. In: LEET (2010)
    • (2010) LEET
    • Cho, C.Y.1    Caballero, J.2    Grier, C.3    Paxson, V.4    Song, D.5
  • 9
    • 77954566293 scopus 로고    scopus 로고
    • Detection and analysis of drive-by-download attacks and malicious javascript code
    • Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious javascript code. In: WWW(2010)
    • (2010) WWW
    • Cova, M.1    Kruegel, C.2    Vigna, G.3
  • 13
    • 84881125906 scopus 로고    scopus 로고
    • Malicia project, http://malicia-project.com/
  • 14
    • 84941155240 scopus 로고
    • Well-separated clusters and optimal fuzzy partitions
    • Dunn, J.C.: Well-separated clusters and optimal fuzzy partitions. Journal of Cybernetics 4(1) (1974)
    • (1974) Journal of Cybernetics , vol.4 , Issue.1
    • Dunn, J.C.1
  • 18
    • 80755168347 scopus 로고    scopus 로고
    • Bitshred: Feature hashing malware for scalable triage and semantic analysis
    • Jang, J., Brumley, D., Venkataraman, S.: Bitshred: Feature hashing malware for scalable triage and semantic analysis. In: CCS (2011)
    • (2011) CCS
    • Jang, J.1    Brumley, D.2    Venkataraman, S.3
  • 21
    • 84881179113 scopus 로고    scopus 로고
    • Krawetz, N.: Average perceptual hash (2011), http://www.hackerfactor.com/ blog/index.php?/archives/432-Looks-Like-It.html
    • (2011) Average Perceptual Hash
    • Krawetz, N.1
  • 22
    • 82955197334 scopus 로고    scopus 로고
    • GQ: Practical containment for measuring modern malware systems
    • Kreibich, C., Weaver, N., Kanich, C., Cui, W., Paxson, V.: GQ: Practical containment for measuring modern malware systems. In: IMC (2011)
    • (2011) IMC
    • Kreibich, C.1    Weaver, N.2    Kanich, C.3    Cui, W.4    Paxson, V.5
  • 23
    • 84881149239 scopus 로고    scopus 로고
    • Love vps, http://www.lovevps.com/
  • 24
    • 84881186378 scopus 로고    scopus 로고
    • Malware domain list, http://malwaredomainlist.com/
  • 28
    • 84881155041 scopus 로고    scopus 로고
    • Ssdsandbox, http://xml.ssdsandbox.net/dnslookup-dnsdb
  • 29
    • 85076751448 scopus 로고    scopus 로고
    • Behavioral clustering of http-based malware and signature generation using malicious network traces
    • Perdisci, R., Lee, W., Feamster, N.: Behavioral clustering of http-based malware and signature generation using malicious network traces. In: NSDI (2010)
    • (2010) NSDI
    • Perdisci, R.1    Lee, W.2    Feamster, N.3
  • 30
    • 84904093630 scopus 로고    scopus 로고
    • Vamo: Towards a fully automated malware clustering validity analysis
    • Perdisci, R., U, M.: Vamo: Towards a fully automated malware clustering validity analysis. In: ACSAC (2012)
    • (2012) ACSAC
    • Perdisci, R.1    U, M.2
  • 31
    • 85084094824 scopus 로고    scopus 로고
    • Ghost turns zombie: Exploring the life cycle of web-based malware
    • Polychronakis, M., Mavrommatis, P., Provos, N.: Ghost turns zombie: Exploring the life cycle of web-based malware. In: LEET (2008)
    • (2008) LEET
    • Polychronakis, M.1    Mavrommatis, P.2    Provos, N.3
  • 35
    • 49949090311 scopus 로고    scopus 로고
    • Learning and classification of malware behavior
    • Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
    • Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 108-125. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5137 , pp. 108-125
    • Rieck, K.1    Holz, T.2    Willems, C.3    Düssel, P.4    Laskov, P.5
  • 38
    • 84857360605 scopus 로고    scopus 로고
    • Abnormally malicious autonomous systems and their internet connectivity
    • Shue, C., Kalafut, A.J., Gupta, M.: Abnormally malicious autonomous systems and their internet connectivity. IEEE/ACMTransactions of Networking 20(1) (2012)
    • (2012) IEEE/ACMTransactions of Networking , vol.20 , Issue.1
    • Shue, C.1    Kalafut, A.J.2    Gupta, M.3
  • 39
    • 84881182634 scopus 로고    scopus 로고
    • The spamhaus project (2012), http://www.spamhaus.org/
    • (2012)
  • 41
    • 84881139137 scopus 로고    scopus 로고
    • urlquery, http://urlquery.net/
  • 42
    • 80755145238 scopus 로고    scopus 로고
    • Effective digital forensics research is investigator-centric
    • Walls, R.J., Levine, B.N., Liberatore, M., Shields, C.: Effective digital forensics research is investigator-centric. In: HotSec (2011)
    • (2011) HotSec
    • Walls, R.J.1    Levine, B.N.2    Liberatore, M.3    Shields, C.4
  • 43
    • 38049026854 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.: Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In: NDSS (2006)
    • (2006) NDSS
    • Wang, Y.-M.1    Beck, D.2    Jiang, X.3    Roussev, R.4    Verbowski, C.5    Chen, S.6    King, S.7
  • 49
    • 84869441116 scopus 로고    scopus 로고
    • Arrow: Generating signatures to detect drive-by downloads
    • Zhang, J., Seifert, C., Stokes, J.W., Lee, W.: Arrow: Generating signatures to detect drive-by downloads. In: WWW (2011)
    • (2011) WWW
    • Zhang, J.1    Seifert, C.2    Stokes, J.W.3    Lee, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.