Behind the scenes of online attacks: an analysis of exploitation behaviors on the web

D Canali, D Balzarotti - 20th Annual Network & Distributed System …, 2013 - hal.science
Web attacks are nowadays one of the major threats on the Internet, and several studies have
analyzed them, providing details on how they are performed and how they spread. However …

Catching predators at watering holes: finding and understanding strategically compromised websites

S Alrwais, K Yuan, E Alowaisheq, X Liao… - Proceedings of the …, 2016 - dl.acm.org
Unlike a random, run-of-the-mill website infection, in a strategic web attack, the adversary
carefully chooses the target frequently visited by an organization or a group of individuals to …

Large-scale security analysis of the web: Challenges and findings

T Van Goethem, P Chen, N Nikiforakis… - Trust and Trustworthy …, 2014 - Springer
As the web expands in size and adoption, so does the interest of attackers who seek to
exploit web applications and exfiltrate user data. While there is a steady stream of news …

The role of web hosting providers in detecting compromised websites

D Canali, D Balzarotti, A Francillon - Proceedings of the 22nd …, 2013 - dl.acm.org
Compromised websites are often used by attackers to deliver malicious content or to host
phishing pages designed to steal private information from their victims. Unfortunately, most …

Enhanced attack collection scheme on high-interaction web honeypots

T Yagi, N Tanimoto, T Hariu… - The IEEE symposium on …, 2010 - ieeexplore.ieee.org
Vulnerabilities in web applications expose computer networks to security threats. In fact, a
large number of websites are used by attackers as hopping sites for attacking other websites …

Monkey-spider: Detecting malicious websites with low-interaction honeyclients

A Ikinci, T Holz, F Freiling - 2008 - dl.gi.de
Client-side attacks are on the rise: malicious websites that exploit vulnerabilities in the
visitor's browser are posing a serious threat to client security, compromising innocent users …

Heat-seeking honeypots: design and experience

JP John, F Yu, Y Xie, A Krishnamurthy… - Proceedings of the 20th …, 2011 - dl.acm.org
Many malicious activities on the Web today make use of compromised Web servers,
because these servers often have high pageranks and provide free resources. Attackers are …

Analysis and visualization of SSH attacks using honeypots

I Koniaris, G Papadimitriou, P Nicopolitidis - Eurocon 2013, 2013 - ieeexplore.ieee.org
In the field of computer security, honeypots are systems aimed at deceiving malicious users
who launch attacks against the servers and network infrastructure of various organizations …

Malicious website detection: Effectiveness and efficiency issues

B Eshete, A Villafiorita… - 2011 First SysSec …, 2011 - ieeexplore.ieee.org
Malicious websites, when visited by an unsuspecting victim infect her machine to steal
invaluable information, redirect her to malicious targets or compromise her system to mount …

Escape from monkey island: Evading high-interaction honeyclients

A Kapravelos, M Cova, C Kruegel, G Vigna - International Conference on …, 2011 - Springer
High-interaction honeyclients are the tools of choice to detect malicious web pages that
launch drive-by-download attacks. Unfortunately, the approach used by these tools, which …