2019
DOI: 10.1587/transinf.2018fcp0007
|View full text |Cite
|
Sign up to set email alerts
|

Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities

Abstract: Many users are exposed to threats of drive-by download attacks through the Web. Attackers compromise vulnerable websites discovered by search engines and redirect clients to malicious websites created with exploit kits. Security researchers and vendors have tried to prevent the attacks by detecting malicious data, i.e., malicious URLs, web content, and redirections. However, attackers conceal parts of malicious data with evasion techniques to circumvent detection systems. In this paper, we propose a system for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Redirection chains are mapped in Takata et al (2018), but, content-based redirects are not considered. Shibahara et al (2019) models redirections irrespective of occurrence, e.g. if URL is found in JS but wasn't accessed, it's still labelled as a redirect.…”
Section: Related Workmentioning
confidence: 99%
“…Redirection chains are mapped in Takata et al (2018), but, content-based redirects are not considered. Shibahara et al (2019) models redirections irrespective of occurrence, e.g. if URL is found in JS but wasn't accessed, it's still labelled as a redirect.…”
Section: Related Workmentioning
confidence: 99%
“…Shibahara et al [25] leveraged redirection subgraph similarities to identify evasive, malicious websites. Classification is performed using a graph mining approach, where the sim-ilarities between redirection subgraphs of malicious, benign and compromised websites are integrated.…”
Section: Related Workmentioning
confidence: 99%