首页> 外文会议>International Conference on Malicious and Unwanted Software >Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud
【24h】

Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud

机译:结合商业共识和社区人群群体对网站的诚信对网络钓鱼和其他网络欺诈的诚信

获取原文

摘要

Traditionally, the protection provided by 3rd party anti-Malware endpoint security products is measured using a sample set that is representative of the prevalent universe of attacks at that point in time (malicious URLs and/or malicious files in the world). The methodology used for such a selection of the Malware attack samples, the so-called Stimulus Workload (SW), has been a matter of controversy for a number of years. The reason is simple. Given a carefully crafted selection of such files or URLs, then, the results of the measurements can varied drastically favoring one vendor versus the other. In [1], Colon Osorio, et.al. argued that the selection process must be strictly regulated, and further, that such a selection must take into account the fact that amongst the samples selected, some pose a greater threat to users than others, as they are more widespread, and hence are more likely to affect a given user. Further, some Malware attack samples may only be found on specific websites, affect specific countries/regions, or only be relevant to a particular operating system version or interface languages (English, German, Chinese, and so forth). In [1], [2], the idea of a Customizable Stimulus Workloads, (CSW) was first suggested, whereas, the collection of samples selected as the Stimulus Workload is required to take into account all the elements described above. Within this context, CSWs are created by filtering attack samples base on prevalence, geographic regions, customer application environments, and other factors. Within the context of this methodology, in this manuscript we will pay special attention to one such specific application environment, primarily, Social Networks. With such a target environment in mind, a CSW was created and used to evaluate the performance of end-point security products. Basically, we examine the protection provided against Malware that uses internet Social Networks as part of the attack vector. When Social Network CSWs are used,- together with differential metrics of effectiveness, we found that amongst the Social Networks studied (Facebook, Google+, and Twitter) the amount of inherent protection provided ranged from negligible to a level that we will call modest self-protection (0% to 18% prevention rate). Further, results of our evaluation showed that the supplemental protection provided by 3rd party anti-Malware products was erratic, ranging from a low of 0% to a high of 93% depending on the product and/or Social Network combination.
机译:传统上,第三方反恶意软件端点安全产品提供的保护是使用代表在该时间点(世界上恶意URL和/或恶意文件)的普遍攻击侵犯宇宙的样本集来测量的保护。用于这种选择恶意软件攻击样本的方法,即所谓的刺激工作量(SW),这是多年来一直存在争议的问题。原因很简单。鉴于这样的文件或URL精心制作的选择,那么,测量结果可以大大偏好一个供应商与另一个供应商变化。在[1],奥罗隆奥奥埃尔特。据称,必须严格调节选择过程,进一步,这种选择必须考虑到所选样品中的事实,一些对用户的威胁更大,因为它们更广泛,因此更有可能影响给定用户。此外,某些恶意软件攻击样本只能在特定网站上找到,影响特定国家/地区,或者只与特定操作系统版本或界面语言(英语,德语,中文等)相关。在[1],[2]中,首先建议定制刺激工作负载(CSW)的思想,而选择作为刺激工作量的样本的集合需要考虑上述所有元件。在此上下文中,通过过滤攻击样本基础的普遍存在,地理区域,客户应用环境和其他因素来创建CSW。在该方法的背景下,在本手稿中,我们将特别注意一个特定的应用环境,主要是社交网络。考虑到这样的目标环境,创建了一个CSW并用于评估端点安全产品的性能。基本上,我们研究了针对使用Internet社交网络的恶意软件提供的保护,作为攻击矢量的一部分。当使用社交网络CSW时, - 与有效性的差分度量一起,我们发现在研究(Facebook,Google+和Twitter)中,所提供的固有保护量远离我们将调用适度自我的水平保护(预防率为18%)。此外,我们的评估结果表明,根据产品和/或社交网络组合,第三方抗恶意软件产品提供的补充保护是不稳定的,从低于0%到高度为93%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号