DSpace Repository

Feature-Based Approaches to Detect Drive-By Download Attacks

Show simple item record

dc.contributor.author Le, Van Lam
dc.date.accessioned 2013-07-10T21:43:59Z
dc.date.accessioned 2022-11-02T22:41:28Z
dc.date.available 2013-07-10T21:43:59Z
dc.date.available 2022-11-02T22:41:28Z
dc.date.copyright 2013
dc.date.issued 2013
dc.identifier.uri https://ir.wgtn.ac.nz/handle/123456789/29209
dc.description.abstract Malicious web pages contain malicious code that can exploit a visitor’s computer system. When a visitor visits a malicious web page, it exploits vulnerabilities on the visitor’s computer system. A successful exploit can lead to downloading and installing a malware on the visitor’s computer system without the visitor’s consent. This type of attacks is called drive-by download attack. Malicious web pages have become significant security issue. The number of malicious web pages has increased significantly and it has raised a special concern from communities. Identification of malicious web pages based upon extracting and analyzing web page features has become an active research area. In term of the features, the research uses a range of different features. Some of them use features from properties of web servers and domain name servers while some of them use features extracted from contents of web pages. Others use features by rending and executing web pages to monitor potential system events. The range of features used raises the question “What are the most useful features for identifying malicious webpages?”. In addition, the number of web pages on the Internet is very large while the number of malicious web pages is very small. To scan web pages on the Internet for malicious ones scales poorly. As a result, it is necessary to improve the scalability in order to allow large numbers of web pages to be scanned. Furthermore, it would be desirable to be able to trade off accuracy for speed for circumstances where the aim is to collect malware rather than identify all potential malicious web pages. This research explores how drive-by download attacks happen and uses this knowledge to develop an approach to detect them effectively based on characteristics of features. We identified the anatomy of drive-by download attacks. Based on the anatomy, we created state-change model of HTML documents and identified potential features to distinguish between benign web pages and malicious ones. We also used the anatomy to identify limitation of each type of features and relationship between them. The features, their limitations and relationships, are in a framework to evaluate features used on detecting malicious web pages. Based on characteristics of features, we found some features were fast to obtain but they were less valuable. They could be used to identify potential malicious web pages to reduce suspicious web pages which need to be inspected by experts or expensive devices. Therefore, we proposed a novel scoring model to identify potential malicious web pages. It used some different types of light-weight features and gave scores of maliciousness of web pages based on each type of features. It then combined these maliciousness scores to form a final maliciousness score for each web page. The experiment showed that our novel scoring model works very effectively. Characteristics of features also showed that some features were extracted by rending and executing web pages while others were obtained without executing them. Therefore, the former required much more time and resources than the latter. We took this into account to propose two-stage classification to detect malicious web pages. The two-stage classification model used static features to filter potential malicious web pages and forwarded them to the second stage to classify them. Our experiment showed that the two-stage classification model worked very effectively in term of speed and cost. Based on the anatomy of drive-by download attack, the key step to carry out a drive-by download attack is to exploit vulnerabilities in a visitor’s computer system in order to execute malicious shellcode. The exploitation is not always successful because the runtime environment at the visitor’s computer is usually unknown. If the exploit fails, the malicious shellcode is not executed and attackers can not take control over the visitor’s computer system. There is no malicious activity happening. Therefore, detection devices working on malicious activities cannot detect the attack. It raises the challenge about monitoring features that can be used to track malicious shellcode delivery to a visitor’s computer system during visitation. We took this question into account by analysing heap-spray attack - a common method to deliver malicious shellcode in a drive-by download attack. Based on characteristics of heap-spray attacks, we proposed a statistical method to detect this attack. en_NZ
dc.language.iso en_NZ
dc.publisher Te Herenga Waka—Victoria University of Wellington en_NZ
dc.rights Access is restricted to staff and students only. For information please contact the library. en_NZ
dc.subject Security en_NZ
dc.subject Drive-by download en_NZ
dc.subject Malicious web page en_NZ
dc.title Feature-Based Approaches to Detect Drive-By Download Attacks en_NZ
dc.type Text en_NZ
vuwschema.contributor.unit School of Engineering and Computer Science en_NZ
vuwschema.subject.anzsrcfor 080303 Computer System Security en_NZ
vuwschema.subject.anzsrcfor 080499 Data Format not elsewhere classified en_NZ
vuwschema.subject.anzsrcfor 080503 Networking and Communications en_NZ
vuwschema.subject.anzsrcseo 890299 Computer Software and Services not elsewhere classified en_NZ
vuwschema.type.vuw Awarded Doctoral Thesis en_NZ
thesis.degree.discipline Computer Science en_NZ
thesis.degree.grantor Te Herenga Waka—Victoria University of Wellington en_NZ
thesis.degree.level Doctoral en_NZ
thesis.degree.name Doctor of Philosophy en_NZ


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account