2014 IEEE Symposium on Security and Privacy 2014
DOI: 10.1109/sp.2014.8
|View full text |Cite
|
Sign up to set email alerts
|

Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections

Abstract: Compromised websites that redirect web traffic to malicious hosts play a critical role in organized web crimes, serving as doorways to all kinds of malicious web activities (e.g., drive-by downloads, phishing etc.). They are also among the most elusive components of a malicious web infrastructure and extremely difficult to hunt down, due to the simplicity of redirect operations, which also happen on legitimate sites, and extensive use of cloaking techniques. Making the detection even more challenging is the re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 14 publications
0
23
0
Order By: Relevance
“…Methods of detecting website compromises that compare original web content to compromised web content have been proposed [12], [13]. Furthermore, TripWire [14], widely known as a compromise detection tool, can detect file operations, such as modification and deletion, by monitoring files on a web server.…”
Section: Problems With Conventional Methods For Compromised Website Rmentioning
confidence: 99%
See 1 more Smart Citation
“…Methods of detecting website compromises that compare original web content to compromised web content have been proposed [12], [13]. Furthermore, TripWire [14], widely known as a compromise detection tool, can detect file operations, such as modification and deletion, by monitoring files on a web server.…”
Section: Problems With Conventional Methods For Compromised Website Rmentioning
confidence: 99%
“…For example, a comparison method [12] using HTML files as original content and a comparison method [13] using well known libraries and frameworks of JavaScript as original content have been proposed. Moreover, TripWire [14] can notify webmasters of changes on websites by e-mail when file operations are detected on a web server on which TripWire is installed.…”
Section: Detecting Compromised Websitesmentioning
confidence: 99%
“…Some common applications include detecting malicious websites [44], [48], automatically neutralizing malicious JavaScript code [18], [20], [28], [36], and filtering anomalies in more general data types that, in today's world, are usually acquire from the web [37], [38].…”
Section: Related Workmentioning
confidence: 99%
“…With respect to collecting representative samples from the web, while we are not aware of any work that samples directly from the PageRank distribution, several works on anomaly detection have employed crawl based methods for collecting data [20], [37], [36], [48]. It has been recognized that simply drawing webpages from a known list (i.e.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation