首页> 外文会议>ACM Conference on Computer and Communications Security >Before We Knew It: An Empirical Study of Zero-Day Attacks In The Real World
【24h】

Before We Knew It: An Empirical Study of Zero-Day Attacks In The Real World

机译:在我们知道之前:对现实世界的零日袭击的实证研究

获取原文

摘要

Little is known about the duration and prevalence of zero-day attacks, which exploit vulnerabilities that have not been disclosed publicly. Knowledge of new vulnerabilities gives cyber criminals a free pass to attack any target of their choosing, while remaining undetected. Unfortunately, these serious threats are difficult to analyze, because, in general, data is not available until after an attack is discovered. Moreover, zero-day attacks are rare events that are unlikely to be observed in honeypots or in lab experiments. In this paper, we describe a method for automatically identifying zero-day attacks from field-gathered data that records when benign and malicious binaries are downloaded on 11 million real hosts around the world. Searching this data set for malicious files that exploit known vulnerabilities indicates which files appeared on the Internet before the corresponding vulnerabilities were disclosed. We identify 18 vulnerabilities exploited before disclosure, of which 11 were not previously known to have been employed in zero-day attacks. We also find that a typical zero-day attack lasts 312 days on average and that, after vulnerabilities are disclosed publicly, the volume of attacks exploiting them increases by up to 5 orders of magnitude.
机译:关于零日攻击的持续时间和患病率众所周知,利用未公开披露的漏洞。对新漏洞的知识给网络犯罪是一个自由通行证来攻击他们选择的任何目标,同时留下未被发现。不幸的是,这些严重的威胁很难分析,因为通常,在发现攻击之后,数据不可用。此外,零天攻击是在蜜罐或实验室实验中不太可能观察到的罕见事件。在本文中,我们描述了一种自动识别来自现场收集的数据的零日攻击的方法,这些数据在全球1100万真正的主机上下载了良性和恶意二进制文件。搜索此数据设置用于利用已知漏洞的恶意文件,指示在披露相应的漏洞之前在Internet上出现了哪些文件。我们识别披露前漏出的18个漏洞,其中11个以前未知过零日攻击。我们还发现,典型的零日攻击平均持续312天,并且在公开披露漏洞之后,利用它们的攻击量增加了5个数量级。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号