skip to main content
10.1145/2508859.2516682acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Shady paths: leveraging surfing crowds to detect malicious web pages

Authors Info & Claims
Published:04 November 2013Publication History

ABSTRACT

The web is one of the most popular vectors to spread malware. Attackers lure victims to visit compromised web pages or entice them to click on malicious links. These victims are redirected to sites that exploit their browsers or trick them into installing malicious software using social engineering.

In this paper, we tackle the problem of detecting malicious web pages from a novel angle. Instead of looking at particular features of a (malicious) web page, we analyze how a large and diverse set of web browsers reach these pages. That is, we use the browsers of a collection of web users to record their interactions with websites, as well as the redirections they go through to reach their final destinations. We then aggregate the different redirection chains that lead to a specific web page and analyze the characteristics of the resulting redirection graph. As we will show, these characteristics can be used to detect malicious pages.

We argue that our approach is less prone to evasion than previous systems, allows us to also detect scam pages that rely on social engineering rather than only those that exploit browser vulnerabilities, and can be implemented efficiently. We developed a system, called SpiderWeb, which implements our proposed approach. We show that this system works well in detecting web pages that deliver malware.

References

  1. Alexa, the Web Information Company. http://www.alexa.com.Google ScholarGoogle Scholar
  2. M. Cova, C. Kruegel, and G. Vigna. Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript code. In International Conference on World Wide Web, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert. Zozzle: Low-overhead mostly static javascript malware detection. In USENIX Security Symposium, 2011.Google ScholarGoogle Scholar
  4. A. Doupe, B. Boe, C. Kruegel, and G. Vigna. Fear the EAR: discovering and mitigating execution after redirect vulnerabilities. In ACM Conference on Computer and Communications Security (CCS), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, et al. Manufacturing compromise: The emergence of exploit-as-a-service. In ACM Conference on Computer and Communications Security (CCS), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Hall, M. and Frank, E. and Holmes, G. and Pfahringer, B. and Reutemann, P. and Witten, I.H. The WEKA Data Mining Software: An Update. In SIGKDD Explorations, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. McAfee Inc. Mapping the Mal Web. Technical report, 2010.Google ScholarGoogle Scholar
  8. A. Kapravelos, Y. Shoshitaishvili, M. Cova, C. Kruegel, and G. Vigna. Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. In USENIX Security Symposium, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Kolbitsch, B. Livshits, B. Zorn, and C. Seifert. Rozzle: De-Cloaking Internet Malware. In IEEE Symposium on Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Lee and J. Kim. WARNINGBIRD: Detecting Suspicious URLs in Twitter Stream. In Symposium on Network and Distributed System Security (NDSS), 2012.Google ScholarGoogle Scholar
  11. Z. Li, K. Zhang, Y. Xie, F. Yu, and X.F. Wang. Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising. In ACM Conference on Computer and Communications Security (CCS), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. H. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G.M. Voelker, and S. Savage. On the effects of registrarlevel intervention. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Lu, R. Perdisci, and W. Lee. SURF: Detecting and Measuring Search Poisoning. In ACM Conference on Computer and Communications Security (CCS), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Ma, L.K. Saul, S. Savage, and G.M. Voelker. Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs. In ACM SIGKDD international conference on Knowledge discovery and data mining, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Nazario. PhoneyC: a Virtual Client Honeypot. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly. Detecting Spam Web Pages Through Content Analysis. In International Conference on World Wide Web, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Platt et al. Sequential minimal optimization: A fast algorithm for training support vector machines. Technical report, 1998.Google ScholarGoogle Scholar
  18. N. Provos, P. Mavrommatis, M.A. Rajab, and F. Monrose. All Your Iframes Point to Us. In USENIX Security Symposium, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Ratanaworabhan, B. Livshits, and B. Zorn. Nozzle: A defense against heap-spraying code injection attacks. In USENIX Security Symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C. Seifert and R. Steenson. Capture-honeypot Client (capture-hpc), 2006.Google ScholarGoogle Scholar
  21. C. Seifert, I. Welch, P. Komisarczuk, et al. Honeyc: the Low-interaction Client Honeypot. Proceedings of the 2007 NZCSRCS, 2007.Google ScholarGoogle Scholar
  22. J.W. Stokes, R. Andersen, C. Seifert, and K. Chellapilla. Webcop: Locating Neighborhoods of Malware on the Web. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The Underground Economy of Fake Antivirus Software. In Workshop on the Economics of Information Security (WEIS), 2011.Google ScholarGoogle Scholar
  24. B. Stone-Gross, R. Stevens, A. Zarras, R. Kemmerer, C. Kruegel, and G. Vigna. Understanding fraudulent activities in online ad exchanges. In ACM SIGCOMM Conference on Internet Measurement, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and Evaluation of a Real-time URL Spam Filtering Service. In IEEE Symposium on Security and Privacy, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. T. Urvoy, E. Chauveau, P. Filoche, and T. Lavergne. Tracking Web Spam with HTML Style Similarities. ACM Transactions on the Web (TWEB), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D.Y. Wang, S. Savage, and G.M. Voelker. Cloak and Dagger: Dynamics of Web Search Cloaking. In ACM Conference on Computer and Communications Security (CCS), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Y.M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated Web Patrol with Strider Honeymonkeys. In Symposium on Network and Distributed System Security (NDSS), 2006.Google ScholarGoogle Scholar
  29. Y.M. Wang and M. Ma. Detecting Stealth Web Pages That Use Click-Through Cloaking. Technical report, Microsoft Research Technical Report, MSR-TR-2006--178, 2006.Google ScholarGoogle Scholar
  30. B. Wu and B.D. Davison. Detecting Semantic Cloaking on the Web. In International Conference on World Wide Web, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. In ACM SIGCOMM Computer Communication Review, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. J. Zhang, C. Seifert, J.W. Stokes, and W. Lee. ARROW: Generating Signatures to Detect Drive-By Downloads. In International Conference on World Wide Web, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Shady paths: leveraging surfing crowds to detect malicious web pages

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
        November 2013
        1530 pages
        ISBN:9781450324779
        DOI:10.1145/2508859

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 November 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '13 Paper Acceptance Rate105of530submissions,20%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader