2014 Ninth Asia Joint Conference on Information Security 2014
DOI: 10.1109/asiajcis.2014.21
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors

Abstract: Drive-by download is one of the major threats to the Web infrastructure. It is triggered by user access to a malicious website and forces users to download malware by exploiting the vulnerabilities of web browsers or plug-ins. Since these malicious websites are ephemeral, it is difficult to keep pace with the emerging and disappearing of such websites. To detect and prevent such attacks, we implemented a framework that aims to detect and prevent drive-by download with users' voluntary monitoring of the web [1]… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 5 publications
(11 reference statements)
0
3
0
Order By: Relevance
“…The small sample size in Matsunaka et al (2014) may be problematic, and, URLs accessed within 2 seconds are labelled as related, but URLs accessed after user interaction, e.g. moving the mouse, labelled as initial entry points (potentially incorrectly).…”
Section: Related Workmentioning
confidence: 99%
“…The small sample size in Matsunaka et al (2014) may be problematic, and, URLs accessed within 2 seconds are labelled as related, but URLs accessed after user interaction, e.g. moving the mouse, labelled as initial entry points (potentially incorrectly).…”
Section: Related Workmentioning
confidence: 99%
“…Matsunaka et al [26] proposed a Framework for Countering Drive-by Download (FCDBD) which consists of monitoring sensors on the client-side (browser, web proxy and DNS), and, an analysis centre on the server-side. FCDBD identifies executable file downloads and classifies as malicious if the download URL is not present in any of the preceding HTTP headers or HTML/JS content.…”
Section: Related Workmentioning
confidence: 99%
“…Matsunaka et al [23] proposed FCDBD that includes monitoring sensors on the client side and analysis center on the network. The sensors include web browsers, web sensors or DNS sensors.…”
Section: Approach To Detect Drive-by Download Based On Charactersmentioning
confidence: 99%