Measurement Study on Malicious Web Servers in the .nz Domain

  • Authors:
  • Christian Seifert;Vipul Delwadia;Peter Komisarczuk;David Stirling;Ian Welch

  • Affiliations:
  • School of Engineering and Computer Science, Victoria Univestity of Wellington, Wellington, New Zealand 6140;School of Engineering and Computer Science, Victoria Univestity of Wellington, Wellington, New Zealand 6140;School of Engineering and Computer Science, Victoria Univestity of Wellington, Wellington, New Zealand 6140;School of Engineering and Computer Science, Victoria Univestity of Wellington, Wellington, New Zealand 6140;School of Engineering and Computer Science, Victoria Univestity of Wellington, Wellington, New Zealand 6140

  • Venue:
  • ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Client-side attacks have become an increasing problem on the Internet today. Malicious web pages launch so-called drive-by-download attacks that are capable to gain complete control of a user's machine by merely having that user visit a malicious web page. Criminals that are behind the majority of these malicious web pages are highly sensitive to location, language and economic trends to increase their return on investment. In this paper, a comprehensive measurement study of malicious web servers on the .nz domain is presented. The risk of drive-by-download attacks has been compared with other domains showing no elevated risk for the .nz domain. However, a comprehensive assessment of the .nz domain showed the existence of malicious web pages across a variety of types of web pages. Blacklisting services showed limited success to protect against such malicious web pages. This is primarily attributed to the highly dynamic nature of malicious web pages. Over a period of eight months, the .nz domain was monitored and continuous shifting of malicious behavior of web pages has been observed. The rates observed show that on average 50% of malicious URLs identified change monthly. The rates pose a challenge to blacklisting services as well as a risk to end users with rapid dissemination of zero-day attacks. Frequent scans of the web are required to obtain a good up-to-date view of the threat landscape.