Browse > Article

An Implementation of System for Detecting and Filtering Malicious URLs  

Chang, Hye-Young (단국대학교 정보컴퓨터학과)
Kim, Min-Jae (단국대학교 컴퓨터학과)
Kim, Dong-Jin (단국대학교 컴퓨터학과)
Lee, Jin-Young (단국대학교 컴퓨터학과)
Kim, Hong-Kun (한국인터넷진흥원)
Cho, Seong-Je (단국대학교 컴퓨터학부)
Abstract
According to the statistics of SecurityFocus in 2008, client-side attacks through the Microsoft Internet Explorer have increased by more than 50%. In this paper, we have implemented a behavior-based malicious web page detection system and a blacklist-based malicious web page filtering system. To do this, we first efficiently collected the target URLs by constructing a crawling system. The malicious URL detection system, run on a specific server, visits and renders actively the collected web pages under virtual machine environment. To detect whether each web page is malicious or not, the system state changes of the virtual machine are checked after rendering the page. If abnormal state changes are detected, we conclude the rendered web page is malicious, and insert it into the blacklist of malicious web pages. The malicious URL filtering system, run on the web client machine, filters malicious web pages based on the blacklist when a user visits web sites. We have enhanced system performance by automatically handling message boxes at the time of ULR analysis on the detection system. Experimental results show that the game sites contain up to three times more malicious pages than the other sites, and many attacks incur a file creation and a registry key modification.
Keywords
Client-side attack; Detecting Malicious URLs; Filtering Malicious URLs; Virtual Machine; Blacklist Message Box;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Christian Seifert, "Know Your Enemy: Malicious Web Servers," The Honeynet Project, KYE paper, Aug. 2007.
2 Kathy Wang, "Using Honeyclients for Detection an Response Against New Attacks," MITRE, http:// www.cerias.purdue.edu/assets/symposium/2008-panels/Wang-Honeyclients-CERIAS-Symposium-18M ar08-v2.pdf
3 Yi-Min, et. al., "Strider HoneyMonkeys: Active, Client-Side Honeypots for Finding Malicious Websites," To be appear in IEEE Transactions on Computers, May 2007.
4 Yi-Min Wang, Doug Beck, et. al., "Automated Web Patrol with Strider HoneyMonkeys," Proc. of the Networks and Distributed System Security Symposium, pp.35-49, Feb. 2006.
5 Alexander Moshchuk, Tanya Bragin, et. al., "A Crawler-based Study of Spyware on the Web," Proc. of the 2006 Networks and Distributed System Security Symposium, pp.17-33, Feb. 2006.
6 N. Proves, D. McNamee, et. al., "The Ghost In The Browser Analysis of Web-based Malware," Proc. of the first USENIX workshop on hot topics in Botnets, Apr. 2007.
7 Niels Provos, Google's Anti-Malware Team, "All Your iFrame Are Point to Us," Google Technical Report provos-2008a, February 11, 2008.