{"title":"一种检测驱动下载攻击的可视化方法","authors":"Tetsuji Takada, K. Amako","doi":"10.1145/2801040.2801070","DOIUrl":null,"url":null,"abstract":"Drive-by Download(DbD) attack is one of malware infection schemes that pose a major threat to users on the Internet. The attack tends to go unnoticed by users, because, upon infection, there is almost no visible change to the screen or the computer. Moreover, infections can occur merely as a result of a user visiting a web page. The conventional approach to DbD attacks is to use anti-virus(AV) software to detect malware. However, this approach is limited, because AV software does not always correctly detect emerging malware. Therefore, we designed a network-communication visualization system to assist in the detection of DbD attacks. We expect that the proposed visualization system will successfully give an awareness to users of suspicious software downloads.","PeriodicalId":399556,"journal":{"name":"Proceedings of the 8th International Symposium on Visual Information Communication and Interaction","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Visual Approach to Detecting Drive-by Download Attacks\",\"authors\":\"Tetsuji Takada, K. Amako\",\"doi\":\"10.1145/2801040.2801070\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Drive-by Download(DbD) attack is one of malware infection schemes that pose a major threat to users on the Internet. The attack tends to go unnoticed by users, because, upon infection, there is almost no visible change to the screen or the computer. Moreover, infections can occur merely as a result of a user visiting a web page. The conventional approach to DbD attacks is to use anti-virus(AV) software to detect malware. However, this approach is limited, because AV software does not always correctly detect emerging malware. Therefore, we designed a network-communication visualization system to assist in the detection of DbD attacks. We expect that the proposed visualization system will successfully give an awareness to users of suspicious software downloads.\",\"PeriodicalId\":399556,\"journal\":{\"name\":\"Proceedings of the 8th International Symposium on Visual Information Communication and Interaction\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-08-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 8th International Symposium on Visual Information Communication and Interaction\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2801040.2801070\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Symposium on Visual Information Communication and Interaction","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2801040.2801070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Visual Approach to Detecting Drive-by Download Attacks
Drive-by Download(DbD) attack is one of malware infection schemes that pose a major threat to users on the Internet. The attack tends to go unnoticed by users, because, upon infection, there is almost no visible change to the screen or the computer. Moreover, infections can occur merely as a result of a user visiting a web page. The conventional approach to DbD attacks is to use anti-virus(AV) software to detect malware. However, this approach is limited, because AV software does not always correctly detect emerging malware. Therefore, we designed a network-communication visualization system to assist in the detection of DbD attacks. We expect that the proposed visualization system will successfully give an awareness to users of suspicious software downloads.