Skip to main content

2019 | OriginalPaper | Buchkapitel

Characterizing Current Features of Malicious Threats on Websites

verfasst von : Wan Nurulsafawati Wan Manan, Abdul Ghani Ali Ahmed, Mohd Nizam Mohmad Kahar

Erschienen in: Intelligent Computing & Optimization

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The advance growth of cybercrime in recent years especially in high critical networks becomes an urgent issue to the security authorities. They compromised computer system, targeting especially to government sector, ecommerce and banking networks rigorously and made it difficult to detect the perpetrators. Attackers used a powerful technique, by embedding a malicious code in a normal webpage that resulted harder detection. Early detection and act on such threats in a timely manners is vital in order to reduce the losses which have caused billions of dollars every year. Previously, the detection of malicious is done through the use of blacklisting repository. The repository or database was compiled over time through crowd sourcing solution (e.g.: PishTank, Zeus Tracker Blacklist, StopBadWare.. etc.). However, such technique cannot be exhaustive and unable to detect newly generated malicious URL or zero-day exploit. Therefore, this paper aims to provide a comprehensive survey and detailed understanding of malicious code and URL features which have been extracted from the web content and structures of the websites. We studied the characteristic of malicious webpage systematically and syntactically and present the most important features of malicious threats in web pages. Each category will be presented along with different dimensions (features representation, algorithm design, etc.).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ahmed, A.A., Li, C.X.: Locating and collecting cybercrime evidences on cloud storage: review. In: 2016 International Conference on Information Science and Security, ICISS 2016 (2017) Ahmed, A.A., Li, C.X.: Locating and collecting cybercrime evidences on cloud storage: review. In: 2016 International Conference on Information Science and Security, ICISS 2016 (2017)
2.
Zurück zum Zitat Sahoo, D., Liu, C., Hoi, S.C.H.: Malicious URL detection using machine learning: a survey, pp. 1–21 (2017) Sahoo, D., Liu, C., Hoi, S.C.H.: Malicious URL detection using machine learning: a survey, pp. 1–21 (2017)
3.
Zurück zum Zitat Awathe, A.: Malicious web page detection through classification technique : a survey, vol. 8491, pp. 74–79 (2017) Awathe, A.: Malicious web page detection through classification technique : a survey, vol. 8491, pp. 74–79 (2017)
4.
Zurück zum Zitat Akiyama, M., Yagi, T., Itoh, M.: Searching structural neighborhood of malicious URLs to improve blacklisting. In: Proceedings of 11th IEEE/IPSJ International Symposium on Applications and Internet, SAINT 2011, pp. 1–10 (2011) Akiyama, M., Yagi, T., Itoh, M.: Searching structural neighborhood of malicious URLs to improve blacklisting. In: Proceedings of 11th IEEE/IPSJ International Symposium on Applications and Internet, SAINT 2011, pp. 1–10 (2011)
5.
Zurück zum Zitat Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of 2007 ACM Workshop on Recurring Malcode - WORM 2007, p. 1 (2007) Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of 2007 ACM Workshop on Recurring Malcode - WORM 2007, p. 1 (2007)
6.
Zurück zum Zitat Ma, J., Saul, L., Savage, S., Voelker, G.: Identifying suspicious URLs: an application of large-scale online learning. In: Proceedings of the 26th Annual International Conference on Machine Learning, pp. 681–688 (2009) Ma, J., Saul, L., Savage, S., Voelker, G.: Identifying suspicious URLs: an application of large-scale online learning. In: Proceedings of the 26th Annual International Conference on Machine Learning, pp. 681–688 (2009)
7.
Zurück zum Zitat Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists : learning to detect malicious web sites from suspicious URLs. In: World Wide Web Internet Web Information System, pp. 1245–1253 (2009) Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists : learning to detect malicious web sites from suspicious URLs. In: World Wide Web Internet Web Information System, pp. 1245–1253 (2009)
8.
Zurück zum Zitat Hou, Y.T., Chang, Y., Chen, T., Laih, C.S., Chen, C.M.: Malicious web content detection by machine learning. Expert Syst. Appl. 37(1), 55–60 (2010)CrossRef Hou, Y.T., Chang, Y., Chen, T., Laih, C.S., Chen, C.M.: Malicious web content detection by machine learning. Expert Syst. Appl. 37(1), 55–60 (2010)CrossRef
9.
Zurück zum Zitat Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler : a fast filter for the large-scale detection of malicious web pages categories and subject descriptors. In: Proceedings of International World Wide Web Conference, pp. 197–206 (2011) Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler : a fast filter for the large-scale detection of malicious web pages categories and subject descriptors. In: Proceedings of International World Wide Web Conference, pp. 197–206 (2011)
10.
Zurück zum Zitat Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. WebApps 11, 11 (2011) Choi, H., Zhu, B.B., Lee, H.: Detecting malicious web links and identifying their attack types. WebApps 11, 11 (2011)
11.
Zurück zum Zitat Eshete, B.: Effective analysis, characterization, and detection of malicious web pages. In: Proceedings of 22nd International Conference on World Wide Web companion, pp. 355–360 (2013) Eshete, B.: Effective analysis, characterization, and detection of malicious web pages. In: Proceedings of 22nd International Conference on World Wide Web companion, pp. 355–360 (2013)
12.
Zurück zum Zitat Kim, B., Im, C., Jung, H.: Suspicious malicious web site detection with strength analysis of a javascript obfuscation. Int. J. Adv. Sci. Technol. 26, 19–32 (2011) Kim, B., Im, C., Jung, H.: Suspicious malicious web site detection with strength analysis of a javascript obfuscation. Int. J. Adv. Sci. Technol. 26, 19–32 (2011)
13.
Zurück zum Zitat Canfora, G., Visaggio, C.A.: A set of features to detect web security threats. J. Comput. Virol. Hacking Tech. 12(4), 243–261 (2016)CrossRef Canfora, G., Visaggio, C.A.: A set of features to detect web security threats. J. Comput. Virol. Hacking Tech. 12(4), 243–261 (2016)CrossRef
14.
Zurück zum Zitat Seshagiri, P., Vazhayil, A., Sriram, P.: AMA: static code analysis of web page for the detection of malicious scripts. Proc. Comput. Sci. 93, 768–773 (2016)CrossRef Seshagiri, P., Vazhayil, A., Sriram, P.: AMA: static code analysis of web page for the detection of malicious scripts. Proc. Comput. Sci. 93, 768–773 (2016)CrossRef
15.
Zurück zum Zitat Saquib, S., Ali, R.: Malicious Behavior in Online Social Network Saquib, S., Ali, R.: Malicious Behavior in Online Social Network
16.
Zurück zum Zitat Neeraja, M., Prakash, J.: Detecting Malicious Posts in Social Networks Using Text Analysis, vol. 5, no. 6, pp. 2015–2017 (2016) Neeraja, M., Prakash, J.: Detecting Malicious Posts in Social Networks Using Text Analysis, vol. 5, no. 6, pp. 2015–2017 (2016)
17.
Zurück zum Zitat Eshete, B.: Security and Privacy in Communication Networks, vol. 106, p. 2015 (2013) Eshete, B.: Security and Privacy in Communication Networks, vol. 106, p. 2015 (2013)
18.
Zurück zum Zitat Fraiwan, M., Al-Salman, R., Khasawneh, N., Conrad, S.: Analysis and identification of malicious javascript code. Inf. Secur. J. 21(1), 1–11 (2012) Fraiwan, M., Al-Salman, R., Khasawneh, N., Conrad, S.: Analysis and identification of malicious javascript code. Inf. Secur. J. 21(1), 1–11 (2012)
19.
Zurück zum Zitat Xu, S., Bylander, T., Maynard, H.B., Sandhu, R., Xu, M.: Detecting and characterizing malicious websites (2014) Xu, S., Bylander, T., Maynard, H.B., Sandhu, R., Xu, M.: Detecting and characterizing malicious websites (2014)
20.
Zurück zum Zitat Bielova, N.: Survey on JavaScript security policies and their enforcement mechanisms in a web browser. J. Log. Algebr. Program. 82(8), 243–262 (2013)CrossRef Bielova, N.: Survey on JavaScript security policies and their enforcement mechanisms in a web browser. J. Log. Algebr. Program. 82(8), 243–262 (2013)CrossRef
Metadaten
Titel
Characterizing Current Features of Malicious Threats on Websites
verfasst von
Wan Nurulsafawati Wan Manan
Abdul Ghani Ali Ahmed
Mohd Nizam Mohmad Kahar
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-00979-3_21

Premium Partner