首页> 外文OA文献 >Cost-effective Detection of Drive-by-Download Attackswith Hybrid Client Honeypots
【2h】

Cost-effective Detection of Drive-by-Download Attackswith Hybrid Client Honeypots

机译:具有成本效益的“下载驱动攻击”检测与混合客户端蜜罐

摘要

With the increasing connectivity of and reliance on computers and networks,important aspects of computer systems are under a constant threat.In particular, drive-by-download attacks have emerged as a new threat tothe integrity of computer systems. Drive-by-download attacks are clientsideattacks that originate fromweb servers that are visited byweb browsers.As a vulnerable web browser retrieves a malicious web page, the maliciousweb server can push malware to a user's machine that can be executedwithout their notice or consent.The detection of malicious web pages that exist on the Internet is prohibitivelyexpensive. It is estimated that approximately 150 million maliciousweb pages that launch drive-by-download attacks exist today. Socalledhigh-interaction client honeypots are devices that are able to detectthese malicious web pages, but they are slow and known to miss attacks.Detection ofmaliciousweb pages in these quantitieswith client honeypotswould cost millions of US dollars.Therefore, we have designed a more scalable system called a hybridclient honeypot. It consists of lightweight client honeypots, the so-calledlow-interaction client honeypots, and traditional high-interaction clienthoneypots. The lightweight low-interaction client honeypots inspect webpages at high speed and forward only likely malicious web pages to thehigh-interaction client honeypot for a final classification.For the comparison of client honeypots and evaluation of the hybridclient honeypot system, we have chosen a cost-based evaluation method:the true positive cost curve (TPCC). It allows us to evaluate client honeypotsagainst their primary purpose of identification of malicious webpages. We show that costs of identifying malicious web pages with thedeveloped hybrid client honeypot systems are reduced by a factor of ninecompared to traditional high-interaction client honeypots.The five main contributions of our work are: High-Interaction Client Honeypot The first main contribution ofour work is the design and implementation of a high-interactionclient honeypot Capture-HPC. It is an open-source, publicly availableclient honeypot research platform, which allows researchers andsecurity professionals to conduct research on malicious web pagesand client honeypots. Based on our client honeypot implementationand analysis of existing client honeypots, we developed a componentmodel of client honeypots. This model allows researchers toagree on the object of study, allows for focus of specific areas withinthe object of study, and provides a framework for communication ofresearch around client honeypots. True Positive Cost Curve As mentioned above, we have chosen acost-based evaluationmethod to compare and evaluate client honeypotsagainst their primary purpose of identification ofmaliciouswebpages: the true positive cost curve. It takes into account the uniquecharacteristics of client honeypots, speed, detection accuracy, and resourcecost and provides a simple, cost-based mechanism to evaluateand compare client honeypots in an operating environment. Assuch, the TPCC provides a foundation for improving client honeypottechnology. The TPCC is the second main contribution of our work. Mitigation of Risks to the Experimental Design with HAZOP - Mitigationof risks to internal and external validity on the experimentaldesign using hazard and operability (HAZOP) study is the thirdmain contribution. This methodology addresses risks to intent (internalvalidity) as well as generalizability of results beyond the experimentalsetting (external validity) in a systematic and thoroughmanner. Low-Interaction Client Honeypots - Malicious web pages are usuallypart of a malware distribution network that consists of severalservers that are involved as part of the drive-by-download attack.Development and evaluation of classification methods that assesswhether a web page is part of a malware distribution network is thefourth main contribution.Hybrid Client Honeypot System - The fifth main contribution is thehybrid client honeypot system. It incorporates the mentioned classificationmethods in the form of a low-interaction client honeypotand a high-interaction client honeypot into a hybrid client honeypotsystemthat is capable of identifying malicious web pages in a cost effectiveway on a large scale. The hybrid client honeypot system outperformsa high-interaction client honeypot with identical resourcesand identical false positive rate.
机译:随着计算机和网络之间连接性的增强以及对计算机和网络的依赖性,计算机系统的重要方面一直受到威胁。特别是,“按驱动下载”攻击已成为对计算机系统完整性的新威胁。驱动下载攻击是来自网络浏览器访问的网络服务器的客户端攻击。随着脆弱的网络浏览器检索到恶意网页,恶意网络服务器可以将恶意软件推送到用户的计算机上,而无需他们的通知或同意即可执行。 Internet上存在的恶意网页非常昂贵。据估计,目前大约存在1.5亿个恶意网页,这些恶意网页发起了按下载驱动攻击。所谓的高交互客户端蜜罐是能够检测到这些恶意网页的设备,但是它们速度较慢,并且已知会错过攻击。使用客户端蜜罐检测这些数量的恶意网页将花费数百万美元。因此,我们设计了一种更具可扩展性的系统,称为混合客户端蜜罐。它由轻量级客户端蜜罐,所谓的低交互客户端蜜罐和传统的高交互客户端蜜罐组成。轻量级的低交互客户端蜜罐会高速检查网页,并仅将可能的恶意网页转发给高交互客户端蜜罐,以进行最终分类。为比较客户端蜜罐和评估混合客户端蜜罐系统,我们选择了一种基于评估方法:真实正成本曲线(TPCC)。它使我们可以评估客户端蜜罐,以防止其识别恶意网页。我们证明,与传统的高交互客户端蜜罐相比,使用已开发的混合客户端蜜罐系统识别恶意网页的成本降低了九倍。我们的五个主要贡献是:高交互客户端蜜罐我们工作的第一主要贡献是高交互客户端蜜罐Capture-HPC的设计和实现。它是一个开放源代码,可公开获得的客户端蜜罐研究平台,它使研究人员和安全专业人员可以对恶意网页和客户端蜜罐进行研究。基于我们的客户蜜罐实施和对现有客户蜜罐的分析,我们开发了客户蜜罐的组件模型。该模型允许研究人员就研究对象达成一致,允许将重点放在研究对象内的特定领域,并为围绕客户蜜罐的研究交流提供框架。真实正成本曲线如上所述,我们选择了一种基于成本的评估方法来比较和评估客户蜜罐,以识别恶意网页的主要目的:真实正成本曲线。它考虑了客户端蜜罐的独特特性,速度,检测准确性和资源成本,并提供了一种简单的基于成本的机制来评估和比较操作环境中的客户端蜜罐。因此,TPCC为改善客户蜜罐技术提供了基础。 TPCC是我们工作的第二个主要贡献。使用HAZOP减轻实验设计的风险-使用危害和可操作性(HAZOP)研究减轻实验设计对内部和外部有效性的风险是第三主要贡献。这种方法以系统和彻底的方式解决了意图(内部有效性)的风险以及超出实验环境(外部有效性)的结果的概括性。低交互客户端蜜罐-恶意网页通常是恶意软件分发网络的一部分,该网络由多个服务器组成,这些服务器参与了按下载驱动攻击的一部分。开发和评估分类方法,以评估网页是否是恶意软件的一部分分销网络是第四主要贡献。混合客户端蜜罐系统-第五主要贡献是混合客户端蜜罐系统。它以低交互客户端蜜罐和高交互客户端蜜罐的形式结合了上述分类方法,该混合方法能够以经济有效的方式大规模识别恶意网页。混合客户端蜜罐系统在资源相同且误报率相同的情况下胜过高交互客户端蜜罐。

著录项

  • 作者

    Seifert Christian;

  • 作者单位
  • 年度 2010
  • 总页数
  • 原文格式 PDF
  • 正文语种 en_NZ
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号