网站恶意软件的调查与分析

Takeshi Yagi, N. Tanimoto, Takeo Hariu, M. Itoh
{"title":"网站恶意软件的调查与分析","authors":"Takeshi Yagi, N. Tanimoto, Takeo Hariu, M. Itoh","doi":"10.1109/WSE.2010.5623567","DOIUrl":null,"url":null,"abstract":"We investigated the distribution of malware on websites by constructing web honeypots carrying vulnerable web applications. With the diffusion of web services caused by the appearance of a new architecture known as cloud computing, a large number of websites have been used by attackers as hopping sites to attack other websites and user terminals. To construct hopping sites, many attackers force victims to download malware by using vulnerabilities in web applications. To protect websites from these attacks, conventional methods, such as using anti-virus software, filter files from attackers using pattern files, which are generated by analyzing conventional malware files collected by security vendors. However, it is difficult to define malware since software files become malicious depending on the situation. In addition, it is difficult to detect malware, which is different from known malware analyzed by security vendors. Recently, variations in malware continue to increase as new types of malware constantly appear. To reveal the actual situation and critical detection ratio of such conventional methods, we investigated the detection ratio of anti-virus software by using malware collected by web honeypots, which collect attacks on websites by using actual vulnerable web applications. Our investigation revealed that anti-virus software fail to detect many malware files, and that traffic patterns to web honeypots are useful for detecting malware files on websites.","PeriodicalId":231763,"journal":{"name":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Investigation and analysis of malware on websites\",\"authors\":\"Takeshi Yagi, N. Tanimoto, Takeo Hariu, M. Itoh\",\"doi\":\"10.1109/WSE.2010.5623567\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We investigated the distribution of malware on websites by constructing web honeypots carrying vulnerable web applications. With the diffusion of web services caused by the appearance of a new architecture known as cloud computing, a large number of websites have been used by attackers as hopping sites to attack other websites and user terminals. To construct hopping sites, many attackers force victims to download malware by using vulnerabilities in web applications. To protect websites from these attacks, conventional methods, such as using anti-virus software, filter files from attackers using pattern files, which are generated by analyzing conventional malware files collected by security vendors. However, it is difficult to define malware since software files become malicious depending on the situation. In addition, it is difficult to detect malware, which is different from known malware analyzed by security vendors. Recently, variations in malware continue to increase as new types of malware constantly appear. To reveal the actual situation and critical detection ratio of such conventional methods, we investigated the detection ratio of anti-virus software by using malware collected by web honeypots, which collect attacks on websites by using actual vulnerable web applications. Our investigation revealed that anti-virus software fail to detect many malware files, and that traffic patterns to web honeypots are useful for detecting malware files on websites.\",\"PeriodicalId\":231763,\"journal\":{\"name\":\"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WSE.2010.5623567\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 12th IEEE International Symposium on Web Systems Evolution (WSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WSE.2010.5623567","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

我们通过构建带有易受攻击的web应用程序的web蜜罐来调查恶意软件在网站上的分布。随着云计算新架构的出现导致web服务的扩散,大量的网站被攻击者作为跳站来攻击其他网站和用户终端。为了构建跳跃网站,许多攻击者利用web应用程序中的漏洞强迫受害者下载恶意软件。为了保护网站免受这些攻击,传统的方法,如使用杀毒软件,使用模式文件过滤攻击者的文件,这些文件是通过分析安全供应商收集的传统恶意软件文件生成的。但是,由于软件文件会根据不同的情况变成恶意软件,因此很难定义恶意软件。此外,恶意软件很难被检测出来,这与安全厂商分析的已知恶意软件不同。最近,随着新型恶意软件的不断出现,恶意软件的变体不断增加。为了揭示这些常规方法的实际情况和临界检出率,我们利用web蜜罐收集的恶意软件对杀毒软件的检出率进行了调查。web蜜罐是利用实际存在漏洞的web应用收集对网站的攻击。我们的调查显示,杀毒软件无法检测到许多恶意软件文件,而网络蜜罐的流量模式对检测网站上的恶意软件文件很有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Investigation and analysis of malware on websites
We investigated the distribution of malware on websites by constructing web honeypots carrying vulnerable web applications. With the diffusion of web services caused by the appearance of a new architecture known as cloud computing, a large number of websites have been used by attackers as hopping sites to attack other websites and user terminals. To construct hopping sites, many attackers force victims to download malware by using vulnerabilities in web applications. To protect websites from these attacks, conventional methods, such as using anti-virus software, filter files from attackers using pattern files, which are generated by analyzing conventional malware files collected by security vendors. However, it is difficult to define malware since software files become malicious depending on the situation. In addition, it is difficult to detect malware, which is different from known malware analyzed by security vendors. Recently, variations in malware continue to increase as new types of malware constantly appear. To reveal the actual situation and critical detection ratio of such conventional methods, we investigated the detection ratio of anti-virus software by using malware collected by web honeypots, which collect attacks on websites by using actual vulnerable web applications. Our investigation revealed that anti-virus software fail to detect many malware files, and that traffic patterns to web honeypots are useful for detecting malware files on websites.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信