2015 5th International Conference on Computer and Knowledge Engineering (ICCKE) 2015
DOI: 10.1109/iccke.2015.7365841
|View full text |Cite
|
Sign up to set email alerts
|

DbDHunter: An ensemble-based anomaly detection approach to detect drive-by download attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Anomaly detection approach [8] have been used to detect DBD. According to [19], attacks by DBDs make use of browser exploit packs (BEPs) that are deployed on compromised servers to spread malware. BEPs that are widely used include sweet orange, Black Hole, Angler, Nuclear, Sakura, Fiesta, Hunter, Magnitude and Styx.…”
Section: Drive-by Download As a Large Scale Web Attacksmentioning
confidence: 99%
“…Anomaly detection approach [8] have been used to detect DBD. According to [19], attacks by DBDs make use of browser exploit packs (BEPs) that are deployed on compromised servers to spread malware. BEPs that are widely used include sweet orange, Black Hole, Angler, Nuclear, Sakura, Fiesta, Hunter, Magnitude and Styx.…”
Section: Drive-by Download As a Large Scale Web Attacksmentioning
confidence: 99%
“…Hence, many methods use additional contents to distinguish malicious traffic from seemingly benign traffic. For instance, some methods analyze JavaScript code to detect them [1].…”
Section: Related Workmentioning
confidence: 99%
“…There are many behavior-based detection methods which extract the features of malicious traffic. These methods extract the features of DbD attacks [1] or C&C traffic [2], [3], [4], and attempt to detect new malicious traffic. Many previous methods, 1 National Defense Academy, Yokosuka, Kanagawa 239-8686, Japan a) mim@nda.ac.jp however, require knowledge of how to extract feature vectors.…”
Section: Introductionmentioning
confidence: 99%
“…These methods can detect only DbD attacks (e.g., Refs. [2], [3], [4]) or C&C traffic (e.g., Refs. [7], [8]).…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, many previous methods require monitoring all network traffic. For instance, [4] requires web contents to detect DbD attacks. Countless organizations, however, do not keep all network traffic because of the size.…”
Section: Introductionmentioning
confidence: 99%