AutoBLG: Automatic URL blacklist generator using search space expansion and filters

B Sun, M Akiyama, T Yagi, M Hatada… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
2015 IEEE Symposium on Computers and Communication (ISCC), 2015ieeexplore.ieee.org
Modern web users are exposed to a browser security threat called drive-by-download
attacks that occur by simply visiting a malicious Uniform Resource Locator (URL) that
embeds code to exploit web browser vulnerabilities. Many web users tend to click such
URLs without considering the underlying threats. URL blacklists are an effective
countermeasure to such browser-targeted attacks. URLs are frequently updated; therefore,
collecting fresh malicious URLs is essential to ensure the effectiveness of a URL blacklist …
Modern web users are exposed to a browser security threat called drive-by-download attacks that occur by simply visiting a malicious Uniform Resource Locator (URL) that embeds code to exploit web browser vulnerabilities. Many web users tend to click such URLs without considering the underlying threats. URL blacklists are an effective countermeasure to such browser-targeted attacks. URLs are frequently updated; therefore, collecting fresh malicious URLs is essential to ensure the effectiveness of a URL blacklist. We propose a framework called automatic blacklist generator (AutoBLG) that automatically identifies new malicious URLs using a given existing URL blacklist. The key idea of AutoBLG is expanding the search space of web pages while reducing the amount of URLs to be analyzed by applying several pre-filters to accelerate the process of generating blacklists. Auto-BLG comprises three primary primitives: URL expansion, URL filtration, and URL verification. Through extensive analysis using a high-performance web client honeypot, we demonstrate that AutoBLG can successfully extract new and previously unknown drive-by-download URLs.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果