A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Website Forensic Investigation to Identify Evidence and Impact of Compromise
[chapter]
2017
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Compromised websites that redirect users to malicious websites are often used by attackers to distribute malware. These attackers compromise popular websites and integrate them into a drive-by download attack scheme to lure unsuspecting users to malicious websites. An incident response organization such as a CSIRT contributes to preventing the spread of malware infection by analyzing compromised websites reported by users and sending abuse reports with detected URLs to webmasters. However,
doi:10.1007/978-3-319-59608-2_25
fatcat:g3birlugyneslaax6ba5z74lbm