skip to main content
10.1145/3033288.3033354acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicnccConference Proceedingsconference-collections
research-article

Exploit Kit Website Detection Using HTTP Proxy Logs

Published:17 December 2016Publication History

ABSTRACT

Exploit kits are software toolkits that are used for widespread malware distribution via automated infection of victims' computers through Internet web pages. They are extremely hard to detect as they constantly evolve by frequently changing the hosted domains and URL patterns which draws any signature-based detection ineffective.

In this paper we analyse common exploit kit characteristics and propose a detection method that relies solely on the information extracted from HTTP proxy logs that are commonly available in most enterprise networks. Our method leverages exploit kit characteristics that are common across different exploit kit families and are unlikely to change as they are crucial for the exploitation process.

We perform two sets of experiments to evaluate the efficacy of the proposed method. The first set uses network traces of a number of publicly available malicious samples to estimate recall of the proposed method. Second set of experiments uses real network traffic collected in large number of corporate networks to estimate the precision. Both sets of experiments show satisfying performance of the algorithm.

References

  1. "Teslacrypt ransomware arrives via neutrino exploit kit." https://blogs.mcafee.com/mcafee-labs/teslacrypt-arrives-via-neutrino-exploit-kit/. Accessed: 2016-09-30.Google ScholarGoogle Scholar
  2. "Malware with your news? Forbes website victim of malvertisig attack." https://www.fireeye.com/blog/threat-research/2015/09/malvertising attack.html. Accessed: 2016-09-28.Google ScholarGoogle Scholar
  3. "Angler exploit kit - operating at the cutting edge." http://community.websense.com/blogs/securitylabs/archive/2015/02/05/Google ScholarGoogle Scholar
  4. C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, et al., "Manufacturing compromise: the emergence of exploit-as-a-service," in Proceedings of the 2012 ACM conference on Computer and communications security, pp. 821--832, ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Taylor, X. Hu, T. Wang, J. Jang, M. P. Stoecklin, F. Monrose, and R. Sailer, "Detecting malicious exploit kits using tree-based similarity searches," in Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 255--266, ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Stringhini, C. Kruegel, and G. Vigna, "Shady paths: Leveraging surfing crowds to detect malicious web pages," in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 133--144, ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Stock, B. Livshits, and B. Zorn, "Kizzle: A signature compiler for exploit kits," in International Conference on Dependable Systems and Networks (DSN), 2015.Google ScholarGoogle Scholar
  8. B. Eshete and V. Venkatakrishnan, "Webwinnow: Leveraging exploit kit workflows to detect malicious urls," in Proceedings of the 4th ACM conference on Data and application security and privacy, pp. 305--312, ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. S. White and J. N. Matthews, "It's you on photo?:Automatic detection of twitter accounts infected with the blackhole exploit kit," in Malicious and Unwanted Software:" The Americas"(MALWARE), 2013 8th International Conference on, pp. 51--58, IEEE, 2013.Google ScholarGoogle Scholar
  10. V. Kotov and F. Massacci, "Anatomy of exploit kits," in International Symposium on Engineering Secure Software and Systems, pp. 181--196, Springer, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. "Cisco cloud web security." http://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html. Accessed: 2016-09-28.Google ScholarGoogle Scholar
  12. "Cisco web security appliance." http://www.cisco.com/c/en/us/products/security/ web-security-appliance/index.html. Accessed: 2016-09-28.Google ScholarGoogle Scholar
  13. "Blue coat." https://www.bluecoat.com/. Accessed: 2016-09-28.Google ScholarGoogle Scholar
  14. "squid: Optimising web delivery." http://www.squid-cache.org/. Accessed: 2016-09-28.Google ScholarGoogle Scholar
  15. "Malware traffic analysis." http://www.malware-traffic-analysis.net/. Accessed: 2016-09-13.Google ScholarGoogle Scholar
  16. "Virus total." https://www.virustotal.com/.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICNCC '16: Proceedings of the Fifth International Conference on Network, Communication and Computing
    December 2016
    343 pages
    ISBN:9781450347938
    DOI:10.1145/3033288

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 December 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader