메뉴 건너뛰기




Volumn , Issue , 2013, Pages 109-120

Delta: Automatic identification of unknown web-based infection campaigns

Author keywords

clustering; computer security; infection campaigns; infection vector identification; malware detection; trend detection; web dynamics; web based malware

Indexed keywords

CLUSTERING; INFECTION CAMPAIGNS; MALWARE DETECTION; TREND DETECTION; WEB DYNAMICS; WEB-BASED MALWARE;

EID: 84889006370     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516725     Document Type: Conference Paper
Times cited : (56)

References (42)
  • 1
    • 84889052087 scopus 로고    scopus 로고
    • SOPHOS Security Team, SOPHOS, Tech. Rep., [Online]. Available
    • SOPHOS Security Team, "SOPHOS Security Threat Report 2013," SOPHOS, Tech. Rep., 2013. [Online]. Available: http://goo.gl/YuW65
    • (2013) SOPHOS Security Threat Report 2013
  • 4
    • 84889073127 scopus 로고    scopus 로고
    • Facebook Security Team, Article, February [Online]. Available
    • Facebook Security Team, "Protecting People On Facebook, "Article, February 2013. [Online]. Available: http://goo.gl/OUPtk
    • (2013) Protecting People on Facebook
  • 5
    • 84889060719 scopus 로고    scopus 로고
    • Exclusive: Apple, Macs hit by hackers who targeted Facebook
    • February [Online]. Available
    • J. Finke and J. Menn, "Exclusive: Apple, Macs hit by hackers who targeted Facebook," Reuters, February 2013. [Online]. Available: http://goo.gl/fzhIo
    • (2013) Reuters
    • Finke, J.1    Menn, J.2
  • 6
    • 84880492977 scopus 로고    scopus 로고
    • A large-scale study of the evolution of web pages
    • Proceedings of the 12th International Conference on World Wide Web, ser. ACM
    • D. Fetterly, M. Manasse, M. Najork, and J. Wiener, "A large-scale study of the evolution of web pages," in Proceedings of the 12th International Conference on World Wide Web, ser. WWW '03. ACM, 2003, pp. 669-678.
    • (2003) WWW '03 , pp. 669-678
    • Fetterly, D.1    Manasse, M.2    Najork, M.3    Wiener, J.4
  • 7
    • 84990932457 scopus 로고    scopus 로고
    • Evolutionary Dynamics of the world wide web
    • January
    • B. A. Huberman and L. A. Adamic, "Evolutionary Dynamics of the world wide web," Condensed Matter, January 1999.
    • (1999) Condensed Matter
    • Huberman, B.A.1    Adamic, L.A.2
  • 9
    • 33845402536 scopus 로고    scopus 로고
    • Web Dynamics, Structure, and Page Quality
    • Springer-Verlag
    • R. Baeza-Yates, C. Castillo, and F. Saint-Jean, "Web Dynamics, Structure, and Page Quality," in Web Dynamics. Springer-Verlag, 2004, pp. 93-109.
    • (2004) Web Dynamics , pp. 93-109
    • Baeza-Yates, R.1    Castillo, C.2    Saint-Jean, F.3
  • 10
    • 76649142367 scopus 로고    scopus 로고
    • Protecting a Moving Target: Addressing Web Application Concept Drift
    • Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, ser. Springer-Verlag
    • F. Maggi, W. Robertson, C. Kruegel, and G. Vigna, "Protecting a Moving Target: Addressing Web Application Concept Drift," in Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, ser. RAID '09. Springer-Verlag, 2009, pp. 21-40.
    • (2009) RAID '09 , pp. 21-40
    • Maggi, F.1    Robertson, W.2    Kruegel, C.3    Vigna, G.4
  • 11
    • 85080711655 scopus 로고    scopus 로고
    • The ghost in the browser analysis of web-based malware
    • First Workshop on Hot Topics in Understanding Botnets, ser. USENIX Association
    • N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu, "The ghost in the browser analysis of web-based malware," in First Workshop on Hot Topics in Understanding Botnets, ser. HOTBOTS '07. USENIX Association, 2007, pp. 4-4.
    • (2007) HOTBOTS '07 , pp. 4-4
    • Provos, N.1    McNamee, D.2    Mavrommatis, P.3    Wang, K.4    Modadugu, N.5
  • 12
    • 77954566293 scopus 로고    scopus 로고
    • Detection and analysis of drive-by-download attacks and malicious JavaScript code
    • Proceedings of the 19th International Conference on World Wide Web, ser. ACM
    • M. Cova, C. Kruegel, and G. Vigna, "Detection and analysis of drive-by-download attacks and malicious JavaScript code," in Proceedings of the 19th International Conference on World Wide Web, ser. WWW'10. ACM, 2010, pp. 281-290.
    • (2010) WWW'10 , pp. 281-290
    • Cova, M.1    Kruegel, C.2    Vigna, G.3
  • 13
    • 84873447654 scopus 로고    scopus 로고
    • Prophiler: A fast lter for the large-scale detection of malicious web pages
    • Proceedings of the 20th International Conference on World Wide Web (WWW '11), ser. ACM
    • D. Canali, M. Cova, G. Vigna, and C. Kruegel, "Prophiler: a fast lter for the large-scale detection of malicious web pages," in Proceedings of the 20th International Conference on World Wide Web (WWW '11), ser. WWW '11. ACM, 2011, pp. 197-206.
    • (2011) WWW '11 , pp. 197-206
    • Canali, D.1    Cova, M.2    Vigna, G.3    Kruegel, C.4
  • 14
    • 80053650188 scopus 로고    scopus 로고
    • All your iFRAMEs point to Us
    • Proceedings of the 17th USENIX Security Symposium, ser. USENIX Association
    • N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose, "All your iFRAMEs point to Us," in Proceedings of the 17th USENIX Security Symposium, ser. SEC'08. USENIX Association, 2008, pp. 1-15.
    • (2008) SEC'08 , pp. 1-15
    • Provos, N.1    Mavrommatis, P.2    Rajab, M.A.3    Monrose, F.4
  • 17
    • 0031167952 scopus 로고    scopus 로고
    • Meaningful Change Detection in Structured Data
    • Proceedings of the ACM SIGMOD International Conference on Management of Data, ser. ACM
    • S. S. Chawathe and H. Garcia-Molina, "Meaningful Change Detection in Structured Data," in Proceedings of the ACM SIGMOD International Conference on Management of Data, ser. MOD'97. ACM, 1997.
    • (1997) MOD'97
    • Chawathe, S.S.1    Garcia-Molina, H.2
  • 18
    • 0344927764 scopus 로고    scopus 로고
    • X-Diff: An effective change detection algorithm for XML documents
    • Proceedings of the 19th International Conference on Data Engineering, ser. IEEE
    • Y. Wang, D. J. DeWitt, and J.-Y. Cai, "X-Diff: An effective change detection algorithm for XML documents," in Proceedings of the 19th International Conference on Data Engineering, ser. ICDE '03. IEEE, 2003, pp. 519-530.
    • (2003) ICDE '03 , pp. 519-530
    • Wang, Y.1    DeWitt, D.J.2    Cai, J.-Y.3
  • 19
    • 0002719797 scopus 로고
    • The Hungarian method for the assignment problem
    • H. W. Kuhn, "The Hungarian method for the assignment problem," Naval Research Logistics Quarterly, vol. 2, no. 1-2, pp. 83-97, 1955.
    • (1955) Naval Research Logistics Quarterly , vol.2 , Issue.1-2 , pp. 83-97
    • Kuhn, H.W.1
  • 20
    • 33746191665 scopus 로고    scopus 로고
    • Identifying almost identical files using context triggered piecewise hashing
    • 0, the Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06)
    • J. Kornblum, "Identifying almost identical files using context triggered piecewise hashing," Digital Investigation, vol. 3, no. 0, pp. 91-97, 2006, the Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06).
    • (2006) Digital Investigation , vol.3 , pp. 91-97
    • Kornblum, J.1
  • 21
    • 84950419860 scopus 로고
    • Advances in Record-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida
    • M. A. Jaro, "Advances in Record-Linkage Methodology as Applied to Matching the 1985 Census of Tampa, Florida," Journal of the American Statistical Association, vol. 84, no. 406, pp. 414-420, 1989.
    • (1989) Journal of the American Statistical Association , vol.84 , Issue.406 , pp. 414-420
    • Jaro, M.A.1
  • 22
    • 84888288499 scopus 로고
    • Three approaches to the quantitative definition of information
    • A. N. Kolmogorov, "Three approaches to the quantitative definition of information," International Journal of Computer Mathematics, vol. 2, no. 1-4, pp. 157-168, 1968.
    • (1968) International Journal of Computer Mathematics , vol.2 , Issue.1-4 , pp. 157-168
    • Kolmogorov, A.N.1
  • 23
    • 84869428407 scopus 로고    scopus 로고
    • You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions
    • Proceedings of the 19th ACM Conference on Computer and Communications Security, ser. ACM
    • N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. Van Acker, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, "You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions," in Proceedings of the 19th ACM Conference on Computer and Communications Security, ser. CCS '12. ACM, 2012.
    • (2012) CCS '12
    • Nikiforakis, N.1    Invernizzi, L.2    Kapravelos, A.3    Van Acker, S.4    Joosen, W.5    Kruegel, C.6    Piessens, F.7    Vigna, G.8
  • 26
    • 0347172110 scopus 로고    scopus 로고
    • OP-TICS: Ordering Points To Identify the Clustering Structure
    • Proceedings of the ACM SIGMOD International Conference on Management of Data, ser. ACM
    • M. Ankerst, M. M. Breunig, H.-P. Kriegel, and J. Sander, "OP-TICS: Ordering Points To Identify the Clustering Structure," in Proceedings of the ACM SIGMOD International Conference on Management of Data, ser. MOD'99. ACM, 1999, pp. 49-60.
    • (1999) MOD'99 , pp. 49-60
    • Ankerst, M.1    Breunig, M.M.2    Kriegel, H.-P.3    Sander, J.4
  • 29
    • 84924734121 scopus 로고    scopus 로고
    • Nozzle: A defense against heap-spraying code injection attacks
    • Proceedings of the 18th USENIX Security Symposium, ser. USENIX Association
    • P. Ratanaworabhan, B. Livshits, and B. Zorn, "Nozzle: A defense against heap-spraying code injection attacks," in Proceedings of the 18th USENIX Security Symposium, ser. SEC'09. USENIX Association, 2009, pp. 169-186.
    • (2009) SEC'09 , pp. 169-186
    • Ratanaworabhan, P.1    Livshits, B.2    Zorn, B.3
  • 30
    • 85076498355 scopus 로고    scopus 로고
    • ZOZZLE: Fast and precise in-browser JavaScript malware detection
    • Proceedings of the 20th USENIX Security Symposium, ser. USENIX Association
    • C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert, "ZOZZLE: fast and precise in-browser JavaScript malware detection," in Proceedings of the 20th USENIX Security Symposium, ser. SEC'11. USENIX Association, 2011, pp. 3-3.
    • (2011) SEC'11 , pp. 3-3
    • Curtsinger, C.1    Livshits, B.2    Zorn, B.3    Seifert, C.4
  • 31
    • 64349114005 scopus 로고    scopus 로고
    • Identification of Malicious Web Pages with Static Heuristics
    • Telecommunication Networks and Applications Conference, ser.
    • C. Seifert, I. Welch, and P. Komisarczuk, "Identification of Malicious Web Pages with Static Heuristics," in Telecommunication Networks and Applications Conference, ser. ATNAC '08, 2008, pp. 91-96.
    • (2008) ATNAC '08 , pp. 91-96
    • Seifert, C.1    Welch, I.2    Komisarczuk, P.3
  • 32
    • 84888984955 scopus 로고    scopus 로고
    • Retrieved, May [Online]. Available
    • "Discuz!" Retrieved, May 2013. [Online]. Available: http://goo.gl/e8nCD
    • (2013) Discuz!
  • 33
    • 84889075882 scopus 로고    scopus 로고
    • Report on the success of the Discuz! software
    • August in Chinese. [Online]. Available
    • X. Yang, "Report on the success of the Discuz! software," Chinese National Radio Report, August 2010, in Chinese. [Online]. Available: http://goo.gl/beq4O
    • (2010) Chinese National Radio Report
    • Yang, X.1
  • 35
    • 74049102282 scopus 로고    scopus 로고
    • English shellcode
    • Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. ACM
    • J. Mason, S. Small, F. Monrose, and G. MacManus, "English shellcode," in Proceedings of the 16th ACM Conference on Computer and Communications Security, ser. CCS '09. ACM, 2009, pp. 524-533.
    • (2009) CCS '09 , pp. 524-533
    • Mason, J.1    Small, S.2    Monrose, F.3    MacManus, G.4
  • 36
    • 33846855150 scopus 로고    scopus 로고
    • Network-level polymorphic shellcode detection using emulation
    • 10.1007/s11416-006-0031-z
    • M. Polychronakis, K. Anagnostakis, and E. Markatos, "Network-level polymorphic shellcode detection using emulation," Journal in Computer Virology, vol. 2, pp. 257-274, 2007, 10.1007/s11416-006-0031-z.
    • (2007) Journal in Computer Virology , vol.2 , pp. 257-274
    • Polychronakis, M.1    Anagnostakis, K.2    Markatos, E.3
  • 39
    • 70350630557 scopus 로고    scopus 로고
    • Beyond blacklists: Learning to detect malicious web sites from suspicious URLs
    • Proceedings of the 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, ser. ACM
    • J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond blacklists: learning to detect malicious web sites from suspicious URLs," in Proceedings of the 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, ser. KDD '09. ACM, 2009, pp. 1245-1254.
    • (2009) KDD '09 , pp. 1245-1254
    • Ma, J.1    Saul, L.K.2    Savage, S.3    Voelker, G.M.4
  • 40
    • 83755178319 scopus 로고    scopus 로고
    • Malicious website detection: E ectiveness and efficiency issues
    • First SysSec Workshop, ser. IEEE
    • B. Eshete, A. Villafiorita, and K. Weldemariam, "Malicious website detection: E ectiveness and efficiency issues," in First SysSec Workshop, ser. SysSec. IEEE, 2011, pp. 123-126.
    • (2011) SysSec. , pp. 123-126
    • Eshete, B.1    Villafiorita, A.2    Weldemariam, K.3
  • 41
    • 85077681170 scopus 로고    scopus 로고
    • A Crawler-based Study of Spyware in the Web
    • Network and Distributed System Security Symposium, ser.
    • A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy, "A Crawler-based Study of Spyware in the Web," in Network and Distributed System Security Symposium, ser. NDSS '06, 2006.
    • (2006) NDSS '06
    • Moshchuk, A.1    Bragin, T.2    Gribble, S.D.3    Levy, H.M.4
  • 42
    • 79957985082 scopus 로고    scopus 로고
    • Anomaly detection techniques for a web defacement monitoring service
    • Sep.
    • G. Davanzo, E. Medvet, and A. Bartoli, "Anomaly detection techniques for a web defacement monitoring service," Expert Systems with Applications, vol. 38, no. 10, pp. 12 521-12 530, Sep. 2011.
    • (2011) Expert Systems with Applications , vol.38 , Issue.10 , pp. 12521-12530
    • Davanzo, G.1    Medvet, E.2    Bartoli, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.