首页> 外文期刊>International Journal of Engineering Research and Applications >Client Honeypot Based Drive by Download Exploit Detection and their Categorization
【24h】

Client Honeypot Based Drive by Download Exploit Detection and their Categorization

机译:基于下载漏洞检测的客户端基于Honeypot的驱动器及其分类

获取原文
           

摘要

Client side attacks are those which exploits the vulnerabilities in client side applications such as browsers, plug-ins etc. The remote attackers execute the malicious code in end user's system without his knowledge. Here in this research, we propose to detect and measure the drive by download class of malware which infect the end user's system through HTTP based propagation mechanism. The purpose of this research is to introduce a class of technology known as client honeypot through which we execute the domains in a virtual machine in more optimized manner. Those virtual machines are the controlled environment for the execution of those URLs. During the execution of the websites, the PE files dropped into the system are logged and further analyzed for categorization of malware. Further the critical analysis has been performed by applying some reverse engineering techniques to categories the class of malware and source of infections performed by the malware.
机译:客户端攻击是指利用客户端应用程序(例如浏览器,插件等)中的漏洞的攻击。远程攻击者在最终用户的系统中执行恶意代码,而他并不了解。在此研究中,我们建议通过基于HTTP的传播机制感染最终用户系统的恶意软件下载类别来检测和测量驱动器。本研究的目的是介绍一种称为客户端蜜罐的技术,通过该技术我们可以在虚拟机中以更优化的方式执行域。这些虚拟机是用于执行这些URL的受控环境。在网站执行期间,将记录掉放入系统中的PE文件,并对其进行进一步分析,以进行恶意软件分类。此外,通过应用一些逆向工程技术对恶意软件的类别和恶意软件执行的感染源进行分类,从而进行了关键分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号