skip to main content
10.1145/2801040.2801070acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvinciConference Proceedingsconference-collections
poster

A Visual Approach to Detecting Drive-by Download Attacks

Published: 24 August 2015 Publication History

Abstract

Drive-by Download(DbD) attack is one of malware infection schemes that pose a major threat to users on the Internet. The attack tends to go unnoticed by users, because, upon infection, there is almost no visible change to the screen or the computer. Moreover, infections can occur merely as a result of a user visiting a web page. The conventional approach to DbD attacks is to use anti-virus(AV) software to detect malware. However, this approach is limited, because AV software does not always correctly detect emerging malware. Therefore, we designed a network-communication visualization system to assist in the detection of DbD attacks. We expect that the proposed visualization system will successfully give an awareness to users of suspicious software downloads.

References

[1]
Van Lam Le, Ian Welch, Xiaoying Gao, and Peter Komisarczuk, Anatomy of drive-by download attack, In Proc. of the Eleventh Australasian Information Security Conference (AISC'13), pp.49--58, 2013.
[2]
Microsoft Cyber Trust Blog, What You Should Know About Drive-By Download Attacks - Part 1, Accessed June 18, 2015 from http://blogs.microsoft.com/cybertrust/2011/12/08/what-you-should-know-about-drive-by-download-attacks-part-1/
[3]
Kevin Borgolte, Christopher Kruegel, and Giovanni Vigna, Delta: automatic identification of unknown web-based infection campaigns, In Proc. of the ACM SIGSAC conference on Computer & communications security (CCS'13), pp.109--120, 2013.

Cited By

View all
  • (2016)Cyber attacks, countermeasures, and protection schemes — A state of the art survey2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA)10.1109/SKIMA.2016.7916194(37-44)Online publication date: 2016

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
VINCI '15: Proceedings of the 8th International Symposium on Visual Information Communication and Interaction
August 2015
185 pages
ISBN:9781450334822
DOI:10.1145/2801040
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 August 2015

Check for updates

Author Tags

  1. Attack detection
  2. Drive-by Download attack
  3. Information visualization
  4. Network traffic
  5. System administration

Qualifiers

  • Poster
  • Research
  • Refereed limited

Conference

VINCI '15

Acceptance Rates

VINCI '15 Paper Acceptance Rate 12 of 32 submissions, 38%;
Overall Acceptance Rate 71 of 193 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Cyber attacks, countermeasures, and protection schemes — A state of the art survey2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA)10.1109/SKIMA.2016.7916194(37-44)Online publication date: 2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media