Anatomy of drive-by download attack

  • Authors:
  • Van Lam Le;Ian Welch;Xiaoying Gao;Peter Komisarczuk

  • Affiliations:
  • Victoria University of Wellington, Wellington, New Zealand;Victoria University of Wellington, Wellington, New Zealand;Victoria University of Wellington, Wellington, New Zealand;University of West London, Ealing, London

  • Venue:
  • AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques to classify web pages as malicious or benign have been proposed in the literature. However, each proposed method uses different content features in order to do the classification and there is a lack of a high-level frameworks for comparing these methods based upon their choice of detection features. The lack of a framework makes it problematic to develop experiments to compare the effectiveness of methods based upon different selections of features. This paper presents such a framework derived from an analysis of of drive-by download attacks that focus upon potential state changes seen when Internet browsers render HTML documents. This framework can be used to identify potential features that have not yet been exploited and to reason about the challenges for using those features in detection drive-by download attack.