Proceedings of the 2018 on Asia Conference on Computer and Communications Security 2018
DOI: 10.1145/3196494.3196542
|View full text |Cite
|
Sign up to set email alerts
|

Investigating Web Defacement Campaigns at Large

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(19 citation statements)
references
References 4 publications
0
18
0
1
Order By: Relevance
“…This may allow for some useful counteraction, such as raising an alarm, blocking malicious content, or simply switching to higher protection thresholds and more verbose logs. For examples and surveys of applications, see [11][12][13][14][15][16][17][18].…”
Section: Definition and Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…This may allow for some useful counteraction, such as raising an alarm, blocking malicious content, or simply switching to higher protection thresholds and more verbose logs. For examples and surveys of applications, see [11][12][13][14][15][16][17][18].…”
Section: Definition and Frameworkmentioning
confidence: 99%
“…Applications of keyed learning fall within the scope of exploratory adversarial learning [2]. This context is generally appropriate for anomaly detection, which comprises several application domains, including intrusion detection [3,5,6,14,25,33,34], attack and malware analysis [7,16,[35][36][37], defacement response [8,17,38,39], Web promotional infection detection [40], and biometric and continuous user authentication [11,18].…”
Section: Applicationsmentioning
confidence: 99%
“…Related work has extensively studied how and why attackers compromise websites through the exploitation of software vulnerabilities [16,18], misconfigurations [23], inclusion of third-party scripts [48], and advertisements [75]. Traditionally, the attackers' goals ranged from website defacements [17,42], over enlisting the website's visitors into distributed denial-of-service (DDoS) attacks [53], to the installation of exploit kits for drive-by download attacks [30,55,56], which infect visitors with malicious executables. In comparison, the abuse of the visitors' resources for cryptomining is a relatively new trend.…”
Section: Related Workmentioning
confidence: 99%
“…Defacement detection can be addressed as an anomaly detection problem: defaced Web content can be labeled as anomalous, based on a classifier that is learned from previously available examples [1,2,5,17]. However, this is not normally sufficient, because an adversary may observe the alarm-raising behaviour of the anomaly detector, and try to find wanted defacements that will escape detection.…”
Section: Introductionmentioning
confidence: 99%