2012 IEEE Symposium on Security and Privacy 2012
DOI: 10.1109/sp.2012.33
|View full text |Cite
|
Sign up to set email alerts
|

EvilSeed: A Guided Approach to Finding Malicious Web Pages

Abstract: Malicious web pages that use drive-by download attacks or social engineering techniques to install unwanted software on a user's computer have become the main avenue for the propagation of malicious code. To search for malicious web pages, the first step is typically to use a crawler to collect URLs that are live on the Internet. Then, fast prefiltering techniques are employed to reduce the amount of pages that need to be examined by more precise, but slower, analysis tools (such as honeyclients). While effect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
72
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 133 publications
(75 citation statements)
references
References 14 publications
2
72
0
Order By: Relevance
“…Also, the hit rate of our approach is the highest, which is around 4 times and 34 times as that of [22] and [23], respectively. This observation shows that our approach is more efficient and effective in discovering/collecting compromised websites, since our approach does not highly rely on the pre-selective keywords (pre-selective keywords typically lead to a low hit rate, which has also been verified by [19]), which are used by both existing approaches.…”
Section: Evaluation Resultssupporting
confidence: 56%
See 1 more Smart Citation
“…Also, the hit rate of our approach is the highest, which is around 4 times and 34 times as that of [22] and [23], respectively. This observation shows that our approach is more efficient and effective in discovering/collecting compromised websites, since our approach does not highly rely on the pre-selective keywords (pre-selective keywords typically lead to a low hit rate, which has also been verified by [19]), which are used by both existing approaches.…”
Section: Evaluation Resultssupporting
confidence: 56%
“…In such case, John et al [20] have similar ideas but target on a different problem, in which the authors propose a framework to find more malicious queries by generating regular expressions from a small set of malicious queries. In a recent concurrent study, EvilSeed [19] also shares similar inspiration but with different target and techniques. It searches the web for pages that are likely malicious by starting from a small set of malicious pages.…”
Section: Related Workmentioning
confidence: 99%
“…Invernizzi et al [11] developed EvilSeed; it can more efficiently search the web for URLs that are likely malicious. Unlike other previous studies, Invernizzi et al leveraged search engines such as Google, Bing, and Yacy to find malicious URLs from vast web space.…”
Section: Non-machine Learning Approachesmentioning
confidence: 99%
“…The seeds fed to the search engine was different from Invernizzi et al's work [11]. They created seeds by changing the structure of existing malicious URLs' path.…”
Section: Non-machine Learning Approachesmentioning
confidence: 99%
“…Comprehensive studies on content analysis have been proposed both for spam [30] and phishing sites [46,50]. Google is also performing phishing detection through content analysis [44], and researchers have used the search engine's index to identify scams campaigns with similar content [16]. In contrast, our system aims to identify the advanced phishing attacks that evade these content-based solutions, obfuscating their content to be resilient to static analyzers.…”
Section: Related Workmentioning
confidence: 99%