2018
DOI: 10.1587/transinf.2017icp0005
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences

Abstract: Security researchers/vendors detect malicious websites based on several website features extracted by honeyclient analysis. However, web-based attacks continue to be more sophisticated along with the development of countermeasure techniques. Attackers detect the honeyclient and evade analysis using sophisticated JavaScript code. The evasive code indirectly identifies vulnerable clients by abusing the differences among JavaScript implementations. Attackers deliver malware only to targeted clients on the basis o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…We conclude that only considering the features of the domain which delivers the exploit leads to the loss of important data. Research focusing on the malicious redirection chains [17], [24]- [30] have slightly different goals or methods, as described in section III.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We conclude that only considering the features of the domain which delivers the exploit leads to the loss of important data. Research focusing on the malicious redirection chains [17], [24]- [30] have slightly different goals or methods, as described in section III.…”
Section: Discussionmentioning
confidence: 99%
“…Takata et al [17] crawled 20,272 malicious websites over 4 years, extracting 8467 JS samples. They visited each website with a browser emulator (honeyclient), and, a real browser (targeted client) with different JS implementations.…”
Section: Related Workmentioning
confidence: 99%
“…The small dataset used in Nagai et al (2019) misses many high profile EKs (Angler, Nuclear, Neutrino, Rig, Fiesta), and, modelling redirects based on time alone is problematic. Redirection chains are mapped in Takata et al (2018), but, content-based redirects are not considered. Shibahara et al (2019) models redirections irrespective of occurrence, e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Altay et al 17 proposed a context‐sensitive and keyword density‐based method by using three machine learning techniques. Compared with the dynamic method of virtual machine real‐time detection 24,25 and honeypot system, 26 the static method based on machine learning can effectively detect unknown malicious web pages, and can avoid costly in‐depth analysis for all webpages.…”
Section: Background and Related Workmentioning
confidence: 99%