Filters








3,140 Hits in 4.3 sec

Analyzing and defending against web-based malware

Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Insup Lee
2013 ACM Computing Surveys  
First, we study the attack model, the root-cause, and the vulnerabilities that enable these attacks. Second, we analyze the status quo of the web-based malware problem.  ...  Web-based malware is a growing threat to today's Internet security. Attacks of this type are prevalent and lead to serious security consequences.  ...  Defending against web-based malware is a difficult task.  ... 
doi:10.1145/2501654.2501663 fatcat:kvmuw7n5wzcq5e4jtpxovxwmue

A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment

Michal Srokosz, Damian Rusinek, Bogdan Ksiezopolski
2018 Proceedings of the 2018 Federated Conference on Computer Science and Information Systems  
In this paper we introduce a new web-based architecture for protecting web applications against CSRF attacks in malicious environemnt.  ...  Rule-based approach becomes useless when the attack is client-related, for example employing malware on the banking site. Malware allows to change the transfer data.  ...  INTRODUCTION O NE OF the ideas to increase Web applications security was Web Application Firewall, a proxy server used to defend web apps against attacks usually employed in the application layer in contrary  ... 
doi:10.15439/2018f208 dblp:conf/fedcsis/SrokoszRK18 fatcat:dvjxbu7k7zg7zp2qhmkahpb4hq

MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats

Daesung Moon, Hyungjin Im, Jae Lee, Jong Park
2014 Symmetry  
In this paper, we propose a Multi-Layer Defense System (MLDS) that can defend against APT.  ...  This system applies a reinforced defense system by collecting and analyzing log information and various information from devices, by installing the agent on the network appliance, server and end-user.  ...  An APT attack uses sophisticated and complex malware. To defend against an APT attack, it is imperative to use a variety of detection technologies.  ... 
doi:10.3390/sym6040997 fatcat:jcxcnct775ejhdfjyhdw4sfk34

AMA: Static Code Analysis of Web Page for the Detection of Malicious Scripts

Prabhu Seshagiri, Anu Vazhayil, Padmamala Sriram
2016 Procedia Computer Science  
To defend against obfuscated malicious JavaScript code, we propose a mostly static approach called, AMA, Amrita Malware Analyzer, a framework capable of detecting the presence of malicious code through  ...  The evaluation based on the links provided in the Malware domain list demonstrates high level accuracy  ...  Conclusion In this paper, Amrita Malware Analyzer is presented for analyzing and detecting malicious HTML elements and JavaScript code in the web pages.  ... 
doi:10.1016/j.procs.2016.07.291 fatcat:p4stuhjlwva4pmxds7bvrmgzii

A simple client-side defense against environment-dependent web-based malware

Gen Lu, Karan Chadha, Saumya Debray
2013 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE)  
Web-based malware tend to be environmentdependent, which poses a significant challenge on defending web-based attacks, because the malicious code-which may be exposed and activated only under specific  ...  This paper proposes a simple approach for defending environment-dependent malware.  ...  CNS-1016058 and CNS-1115829, and the Air Force Office of Scientific Research (AFOSR) via grant no. FA9550-11-1-0191.  ... 
doi:10.1109/malware.2013.6703694 dblp:conf/malware/LuCD13 fatcat:nedorta7svajxmvizo7jraw3dy

NCEF Tools Whitepaper October 2019 V02.pdf [article]

Mark Brett
2019 Figshare  
This article presents a number of open source tools that can help network defenders and local government security managers.  ...  and defend against that step.  ...  MITRE ATT&CK ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally accessible, open and free knowledge base of adversary tactics and techniques based on real-world observations.  ... 
doi:10.6084/m9.figshare.9963722.v1 fatcat:ikndfrzifbe43lhltfhdmi7v6i

Toward securing sensor clouds

Apu Kapadia, Steven Myers, XiaoFeng Wang, Geoffrey Fox
2011 2011 International Conference on Collaboration Technologies and Systems (CTS)  
proper, and (iii) Defense against the side-channel analysis on the Software-as-a-Service infrastructure.  ...  In particular, we discuss our work on (i) Sensor risk assessment, relating to the possession and environment of the smartphone sensors, (ii) New malware threats and defenses installed on the sensor network  ...  We outline research challenges associated with assessing the trustworthiness of the sensors based on environmental sensor data, detecting and defending against "sensory malware" on such sensors, and mitigating  ... 
doi:10.1109/cts.2011.5928699 dblp:conf/cts/KapadiaMWF11 fatcat:bhf45zqqszgybcxv25qgo7fb5e

Evasive Malware via Identifier Implanting [chapter]

Rui Tanabe, Wataru Ueno, Kou Ishii, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Christian Rossow
2018 Lecture Notes in Computer Science  
We present a web-based reconnaissance strategy, where an actor leaves marks on the target system such that the customized malware can recognize this particular system in a later stage, and only then exposes  ...  To defend against this novel attack, we discuss countermeasures and a responsible disclosure process to allow appliances vendors to prepare for such attacks.  ...  A part of this work was funded by the WarpDrive: Web-based Attack Response with Practical and Deployable Research Initiative project, supported by the National Institute of Information and Communications  ... 
doi:10.1007/978-3-319-93411-2_8 fatcat:3bavl7pdlncrbdtwjxtnjad5sq

WebPatrol

Kevin Zhijie Chen, Guofei Gu, Jianwei Zhuge, Jose Nazario, Xinhui Han
2011 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11  
While traditional malware collection and analysis are mainly focusing on binaries, it is important to develop new techniques and tools for collecting and analyzing web-based malware, which should include  ...  By leveraging the large population of (insecure) web sites and exploiting the vulnerabilities at client-side modern (complex) browsers (and their extensions), web-based malware becomes one of the most  ...  To defend against this emerging type of threat, automated collection and analysis of web-based malware are necessary.  ... 
doi:10.1145/1966913.1966938 dblp:conf/ccs/ChenGZNH11 fatcat:pcijytnuuzhptj2q5fgsn5tbr4

DomainProfiler: toward accurate and early discovery of domain names abused in future

Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Tatsuya Mori, Shigeki Goto
2017 International Journal of Information Security  
Moreover, we verified the effectiveness of our system in terms of the benefits from our TVPs and defense against cyber-attacks.  ...  Domain names are at the base of today's cyber-attacks.  ...  reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s10207-017-0396-7 fatcat:76lycknkfnbadlsqoowvbfquse

SubVirt: implementing malware with virtual machines

S.T. King, P.M. Chen
2006 2006 IEEE Symposium on Security and Privacy (S&P'06)  
By assuming this perspective, we hope to help defenders understand and defend against the threat posed by a new class of rootkits.  ...  This new type of malware, which we call a virtual-machine based rootkit (VMBR), installs a virtual-machine monitor underneath an existing operating system and hoists the original operating system into  ...  We thank Peter Biddle, Brandon Baker, and Eric Traut for providing valuable insight and discussions about this topic.  ... 
doi:10.1109/sp.2006.38 dblp:conf/sp/KingCWVWL06 fatcat:ni66zp57gjeqfn64qdzpqzz3yq

A survey of intrusion detection techniques

Sharanya Chandran, K Senthil Kumar
2018 International Journal of Engineering & Technology  
This paper provides literature review of work done in these areas and their respective mitigations.  ...  Thus the applications are vulnerable to security issues like phishing attacks, denial of service attacks, cross-site scripting attack and many more.  ...  Supervised machine learning can detect attacks and be trained offline using a training data The web applications make use of signatures and profiles [27] The web server will check against the signatures  ... 
doi:10.14419/ijet.v7i2.4.13036 fatcat:hzemt5imhbfr7ajvtguya3ixjy

Method for Detecting Core Malware Sites Related to Biomedical Information Systems

Dohoon Kim, Donghee Choi, Jonghyun Jin
2015 Computational and Mathematical Methods in Medicine  
Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by  ...  In particular, we dynamically estimate the risk index of the affected websites by analyzing various centrality measures and converting them into a single quantified vector.  ...  To defend against APT attacks on biomedical information systems, it is vital to analyze the way in which the network between medical websites and related websites is formed.  ... 
doi:10.1155/2015/756842 pmid:25821511 pmcid:PMC4363596 fatcat:zmcoutzdv5axvpqmho7v75yhmu

An Open Source, Extensible Malware Analysis Platform

P. Michalopoulos, V. Ieronymakis, M.T. Khan, D. Serpanos, S. Pantelakis, S. Koubias
2018 MATEC Web of Conferences  
In order to protect the systems and their legitimate users from these threats, anti-malware applications are developed as a defense against malware.  ...  However, most of these applications detect malware based on signatures or heuristics that are still created manually and are error prune.  ...  Technological Sector", funded by the Operational Programme "Competitiveness, Entrepreneurship and Innovation" (NSRF 2014-2020) and co-financed by Greece and the European Union (European Regional Development  ... 
doi:10.1051/matecconf/201818805009 fatcat:6dkvnl3ppvcx7ismfznycjy54q

Assessing the Intentions and Timing of Malware

Brent Maheux
2014 Technology Innovation Management Review  
He has over 7 years working experience within the public and private sector specializing in product design and implementation.  ...  Then, drawing upon the examples of malware analyzed earlier, an intention-based classification of malware is proposed and combined with the optimal timing model to illustrate how the optimal timing of  ...  Figure 1 . 1 An intention-based classification of malware The political malware examples would be found in the top left corner of ). 4. Code Red: Vulnerable web servers.  ... 
doi:10.22215/timreview848 fatcat:llsmaoijfbe55aptmthzp2jojm
« Previous Showing results 1 — 15 out of 3,140 results