2010
DOI: 10.1587/transcom.e93.b.1131
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 49 publications
(27 citation statements)
references
References 0 publications
0
27
0
Order By: Relevance
“…The input of the proposed system is a URL blacklist constructed and maintained by a client honeypot Marionette [13] and the sandbox BotnetWatcher [14] , which can analyze online malware while preventing infection to other hosts. Our data-gathering period was from August 02, 2011 to October 01, 2014.…”
Section: Pre-processingmentioning
confidence: 99%
See 2 more Smart Citations
“…The input of the proposed system is a URL blacklist constructed and maintained by a client honeypot Marionette [13] and the sandbox BotnetWatcher [14] , which can analyze online malware while preventing infection to other hosts. Our data-gathering period was from August 02, 2011 to October 01, 2014.…”
Section: Pre-processingmentioning
confidence: 99%
“…We use three tools to verify the URLs extracted by URL filtration: the Marionette web client honeypot [13] , antivirus software, and VirusTotal [23]. The Marionette client can trace the redirection generated by drive-by-download attacks and identify the malware distribution URL.…”
Section: Url Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Steps 1 and 2 involve generating templates from outbound traffic captured in our sandbox system [11] running malware samples (malware traffic). Our malware samples were obtained from our high-interaction honeyclient [12], [13]. Steps 3 and 4 involve matching traffic with templates based on two criteria: the similarity to the templates and the rarity of each element in the templates.…”
Section: System Overviewmentioning
confidence: 99%
“…The sandbox supports executable files only in Microsoft Windows environments. These malware samples were collected using the honeyclient [12], [13] crawling public blacklists such as MDL [15] and hpHosts [16] and some commercial blacklists from August 2011 to August 2013. Table 2 lists the number of malware samples in each dataset, number and ratio of samples detected by antivirus software, number of unique malware family names, and number of HTTP requests.…”
Section: Datasetsmentioning
confidence: 99%