首页> 外文会议>International conference on world wide web >The Role of Web Hosting Providers in Detecting Compromised Websites
【24h】

The Role of Web Hosting Providers in Detecting Compromised Websites

机译:虚拟主机提供商在检测受损网站中的作用

获取原文

摘要

Compromised websites are often used by attackers to deliver malicious content or to host phishing pages designed to steal private information from their victims. Unfortunately, most of the targeted websites are managed by users with little security background -often unable to detect this kind of threats or to afford an external professional security service. In this paper we test the ability of web hosting providers to detect compromised websites and react to user complaints. We also test six specialized services that provide security monitoring of web pages for a small fee. During a period of 30 days, we hosted our own vulnerable websites on 22 shared hosting providers, including 12 of the most popular ones. We repeatedly ran five different attacks against each of them. Our tests included a bot-like infection, a drive-by download, the upload of malicious flies, an SQL injection stealing credit card numbers, and a phishing kit for a famous American bank. In addition, we also generated traffic from seemingly valid victims of phishing and drive-by download sites. We show that most of these attacks could have been detected by free network or file analysis tools. After 25 days, if no malicious activity was detected, we started to file abuse complaints to the providers. This allowed us to study the reaction of the web hosting providers to both real and bogus complaints. The general picture we drew from our study is quite alarming. The vast majority of the providers, or "add-on" security monitoring services, are unable to detect the most simple signs of malicious activity on hosted websites.
机译:攻击者通常使用受感染的网站来分发恶意内容或托管旨在窃取其受害者的私人信息的网络钓鱼页面。不幸的是,大多数目标网站是由几乎没有安全背景的用户管理的-通常无法检测到此类威胁或无法提供外部专业安全服务。在本文中,我们测试了网络托管服务提供商检测受感染网站并响应用户投诉的能力。我们还测试了六项专门服务,这些服务可提供少量费用的网页安全监控。在30天的时间内,我们在22个共享托管提供商中托管了自己的漏洞网站,其中包括12个最受欢迎的托管提供商。我们针对它们中的每一个反复进行了五次不同的攻击。我们的测试包括类似bot的感染,偷渡式下载,恶意苍蝇的上载,SQL注入窃取信用卡号以及针对著名美国银行的网络钓鱼工具包。此外,我们还从看似有效的网络钓鱼和偷渡式下载站点的受害者那里产生了流量。我们表明,大多数此类攻击可能已由免费网络或文件分析工具检测到。 25天后,如果未检测到恶意活动,我们便开始向提供者提出滥用投诉。这使我们能够研究虚拟主机提供商对真实和虚假投诉的反应。我们从研究中得出的总体情况令人震惊。绝大多数提供程序或“附加”安全监视服务无法检测到托管网站上最简单的恶意活动迹象。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号