Landing Landing Intermediate Exploit Exploit Distribution Provos [1] Drive-by Download (Exploit Distribution ) Drive-by Download (FCDBD: Framework for

Size: px
Start display at page:

Download "Landing Landing Intermediate Exploit Exploit Distribution Provos [1] Drive-by Download (Exploit Distribution ) Drive-by Download (FCDBD: Framework for"

Transcription

1 Drive-by Download Web 1,a) 1,b) 1,c) Web Web Web Drive-by Download FCDBD(Framework for Countering Drive-By Download) FCDBD Drive-by Download Landing Web <iframe> Landing Web JavaScript Web Drive-by Download Web A Feasibility Study for Enhancing the Framework for Countering Drive-by Download Attacks with Analysis of Web Link Structures of Websites Abstract: The authors proposed the Framework for Countering Drive-By Download (FCDBD) which monitors the Web by utilizing web access logs from users and detects malicious websites related to the drive-by download attacks. Monitoring link-related behaviors is one of the approaches to detect the malicious websites in the framework. The authors proposed a detection method for the Landing site of Drive-by Download attacks. The method focused on the change of referred websites from a webpage. However, a legitimate webpage has many changes of referred websites caused by advertisement websites or traffic analysis websites. Therefore, it is hard to extract the change caused by the defacement and detect the Landing site correctly. In this paper, the authors propose the improved method for detecting the Landing site of drive-by download attacks. Keywords: Drive-by download attack, Web link analysis 1. Drive-by Download Web Web Web 1 ( )KDDI KDDI R&D Laboratories Inc., Ohara, Fujimino, Saitama , Japan a) [email protected] b) [email protected] c) [email protected] 1 Drive-by Download (OS ) (Exploit ) (Distribution ) Exploit (Intermediate ) Intermediate (Landing ) Landing Intermediate Exploit (JavaScript PHP ) 1

2 Landing Landing Intermediate Exploit Exploit Distribution Provos [1] Drive-by Download (Exploit Distribution ) Drive-by Download (FCDBD: Framework for Countering Drive-By Download) [2] [6] Web Web Web Drive-by Download Web Web Web Drive-by Download Drive-by Download [3] Web / Exploit [5] Web Landing [6] Landing JavaScript [4] Landing Web / Web Landing Landing FCDBD Web Web HTTP Request HTTP Response User Force to download malwares 1 Exploit the vulnerabilities Landing sites (defaced) Intermediate sites Drive-by Download Exploit site Distribution site (False Positives) Web % / [5] (Exploit ) 1.5% Web 2. Drive-by Download Drive-by Download Web (honeyclient) Web () [7] [8] honeyclient seed Web (cloaking) Drive-by Download Web ( ) Zhang [10] Drive-by Download HTTP URL 2

3 Web Access Log, Contents 2 Analysis Center Web Access Log Analysis (Web Link Analysis) Content Analysis (Dynamic/Static) The Internet Access/Download Monitoring Sensors Browser Sensor Web Proxy Sensor Users FCDBD Warnings (central server) MDN(Malware Distribution Network) central server URL MDN Stringhini [11] (OS ) Web Drive-by Download Wand [12] [10] MDN Landing HTML URL MDN URL MDN Landing MDN 3. FCDBD: Framework for Countering Drive-By Download 3.1 FCDBD FCDBD(Framework for Countering Drive-By Download) Drive-by Download [2] [6] 2 FCDBD FCDBD Web ( ) Web (Web ) Web 1 ID Web URL Web HTTP Request/Response Web 1 Web ID ID Web Web Web Web Web Web Web Landing [6] Web / Exploit [5] Web Web Drive-by Download Web [3] 2 / [13] (URL) 3

4 3 Exploit / Distribution Landing <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <HTML>... </DIV><!--c ><script type="text/javascript" src="hxxp://lodgesure.co.za/.../nfyvrkb8.php?id= "></script><!--/c >... </HTML> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <HTML>... </DIV>... </HTML> 4 Landing 3.2 Web Drive-by Download FCDBD Web Drive-by Download Web [6] [5] [3] 1: Landing 3 Web Web Landing Web google twitter Alexa[14] ( ) Firefox Adblock Plus[15] [6] 4 URL URL Landing 4 () <script> Web ( ) Web <script> Web Landing 2: / Exploit 5 Drive-by Download [16] D3M(Drive-by Download Dataset by Marionette) [17] 1 Web Exploit 5 Exploit Exploit Exploit (Exploit /Distribution ) Web Web Exploit Web #fanin#fan-out #fan-in > 1 #fan-out = 1 Web Exploit 4

5 Web /3/3 2014/3/4 Web u 1 u 1 1. Web r 1 r 2 r 1 r 2 r 1,a 2. Web ( 1) {(Web, { })} = {(u 1, {r 1,a, r 1,b,...}),..., (u n, {r n,a,...})} 3. / ( 2) 2 (#fan-in > 1?) u 1 u 3 r 1,a Landing? Exploit? Landing : u 1,..., u m Exploit : r 1,a,..., r m,a,..., r m,l (#fan-out = 1?) r 5 7 Landing Landing site u/.../check.php buzziskin.net/.../ returning_depending.php /.../check.php 2 Web Web : 1,684 : 2014/3/3 2014/3/14( ) URL : 7, Exploit site /Distribution site buzziskin.net/.../ returning_depending.php? xxx (PDF) buzziskin.net/.../ returning_depending.php? yyy (EXE) Drive-by Download Landing #fan-in 2 Exploit #fan-out = 1 Exploit /Distribution / Exploit Landing 7 Landing Web Web Web 1 Web ( ) Web / #fan-in#fan-out #fan-in > 1 #fan-out = 1 Exploit Web Landing 5. Landing 3.2 Landing FCDBD Web Web Web Web 2 Web Web 1,684URL Web URL FCDBD Web Internet Explorer 8 Web (false positives) 8 5

6 Web (2014/3/3 2014/3/14) Web : 1,680URL : 7, Web 2. Web ( 1) Web : 100URL(6.0%)/1 : 116 /1 3. / ( 2) 4 (87 ) Web Advertisement 29 Computers/Internet 21 Internet/Infrastructure /Search Engines/Portals 11 Business/Economy/Finantial 10 Blogs/Web Communications 3 Pornography/Adult/Mature 3 Arts/Entertainment/Games 3 Auctions/Shopping 2 Brokerages/Trading 2 Health/Society/Life Style 2 News/Media 1 Web : 24URL(1.5%)/1 : 18 / Web Web 1,680URL Web ( ) ( 1) Web Web / (Exploit ) Web ( 2) (false positives) Web Web 3 1 Web 3 Web (4.6% 7.5%) Web (1.6% 3.2%) ( 24.2%) 492 ( 2.3%) 10 1 Web 70 (4.1%) 20 (1.2%) Web (0.7% 3.3%) % 5.8% (0.2% 0.7%) (8.9%) 87 (0.5%) Trend Micro Site Safety Center [18] Web Web (Web Advertisement) (Computer/Internet/Infrastructure) webbug Web Web / 2 /

7 3 1 (YYMMDD) Web 1,684 1,684 1,684 1,684 1,684 1,684 1,684 1,684 1,684 1,684 1,684 5,397 5,315 5,240 5,375 5,192 5,318 5,158 5,516 5,285 5,232 7, (YYMMDD) 3326 Web( 1) ( 1) Web( 2) ( 2) (1 : ( 1)Web :100.2(6.0%) :116.1(2.2%) ( 2)Web :24.8(1.5%) :18.2(0.3%)) (YYMMDD) Web( )( 1) ( )( 1) Web( )( 2) ( )( 2) 10 ( ) / (#fan-in > 1 #fan-out = 1 ) 5 5 Drive-by Download [1] / / 1 FCDBD Landing FCDBD Landing Drive-by Download Web Web Web / Web Landing FCDBD 1.5% 100 Web 1 2 FCDBD Web * URL Web 1.5% 23,000 Web Landing Exploit Web *1 7

8 5 2 (YYMMDD) ,397 5,836 6,152 6,507 6,718 6,947 7,152 7,495 7,720 7, ,007 1,094 1, % 8.7% 9.5% 10.7% 11.2% 11.8% 12.3% 13.4% 14.2% 14.7% Web Drive-by Download Landing Web Landing Web / Web Landing 1 6.0% 1.5% FCDBD FCDBD *2 (( NICT) : : ) [1] N. Provos, P. Mavrommatis, M. A. Rajab and F. Monrose, All Your iframes Point to Us, Proc. the 17th USENIX Security Symposium, [2],,,,,, 2011(CSS2011), [3] T. Matsunaka, A. Kubota and T. Kasama, An Approach to Detect Drive-by Download by Observing the Web Page Transition Behaviors, Proc. of 9th Asia Joint Con- *2 ference on Information Security (AsiaJCIS2014), [4].,,,, 31 (SCIS2014), [5],,, Drive-by Download Web Web, 2014(CSS2014), [6] T. Matsunaka, J. Urakawa and A. Kubota, Detecting and Preventing Drive-by Download Attack via Participative Monitoring of the Web, Proc. of 8th Asia Joint Conference on Information Security (AsiaJCIS2013), [7] M. Akiyama, M. Iwamura, Y. Kawakoya, K. Aoki and M. Itoh, Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attack, IEEE Trans. of Communication, Vol. E93 B, No. 5, pp , May [8] Y M. Wang, D. Beck, X. Jiang, C. Verbowski, S. Chen and S. King, Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities, Proc. 13th Annual Network & Distributed System Security Symposium (NDSS2006), [9] J. W. Stokes, R. Andersen, C. Seifert and K. Chellapilla, WebCop: Locating Neighborhoods of Malware on the Web, Proc. 3rd USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET2010), [10] J. Zhang, C. Seifert, J. W. Stokes and W. Lee, ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads, Proc. 20th International World Wide Web Conference (WWW2011), [11] G. Stringhini, C. Kruegel and G. Vigna, Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages, Proc. 20th ACM Conference on Computer and Communications Security (CCS2013), [12] G. Wand, J. W. Stokes, C. Herley and D. Felstead, Detecting Malicious Landing Pages in Malware Distribution Networks, Proc. 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN2013), [13],,,,,, JavaScript, (CSEC), Vol CSEC-64, No. 21, [14] Alexa Actionable Analytics of the Web, alexa.com. [15] Adblock Plus, [16] 2014(MWS2014) [17],,,, MWS Datasets 2014, (CSEC) Vol CSEC-66, No. 19, [18] Trend Micro, Site Safety Center, sitesafety.trendmicro.com/index.php. 8

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

2 web high interaction web low interaction Capture- HPC[11] HoneyClient[5] HoneyC[12] SpyBye[7] HoneyC SpyBye snort exploit 3 Drive-by-download Web (

2 web high interaction web low interaction Capture- HPC[11] HoneyClient[5] HoneyC[12] SpyBye[7] HoneyC SpyBye snort exploit 3 Drive-by-download Web ( NTT 3-9-11 {akiyama.mitsuaki,iwamura.makoto,kawakoya.yuhei, aoki.kazufumi,itoh.mitsutaka}@lab.ntt.co.jp Web drive-by-download web drive-by-download web web Implementation and Evaluation of Detection Methods

More information

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google Drive-by Download 1,a) 1,b) Web Drive-by Download(DbD) DbD Web DbD HTTP DbD Web DbD, Drive-by Download The Network Visualization Tool for detecting the Drive-by Download attacks. Amako Katsuhiro 1,a) Takada

More information

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake

More information

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i 26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution

More information

日本感性工学会論文誌

日本感性工学会論文誌 Vol.13 No.2 pp.391-402 2014 PROGRESS Consideration of the Transition in Mitsubishi Electric Corporate Website Design Transition in Response to Environmental Change and Record through the Case of Corporate

More information

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数 Computer Security Symposium 2014 22-24 October 2014 Firefox 182-8585 1-5-1 [email protected] {kazushi, oyama}@inf.uec.ac.jp Web Firefox Firefox Firefox Investigation on Attack and Stealth Methods

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

CCC DATAset 2009 によるマルウェア配布元の可視化

CCC DATAset 2009 によるマルウェア配布元の可視化 CCC DATAset 2009 105-0001 4-1-17 3F CCC DATAset 2009 1 URL Visualization of the Malware distribution by CCC DATAset 2009 Takahiro Matsuki Yuu Arai Risk Research Institute of Cyber Space, Little earth Corporation

More information

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura

More information

Web Web Web Web Web IP

Web Web Web Web Web IP 2012 Web 2013 2 1 5111B073-1 1 5 1.1... 5 1.2... 6 1.3... 6 2 Web 8 2.1 Web... 8 2.2 Web... 9 2.2.1... 9 2.2.2 Web... 10 2.2.3 Web... 11 3 13 3.1... 13 3.2... 15 3.2.1 IP... 15 3.2.2 WHOIS... 17 3.2.3

More information

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community

More information

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(Information and Communication Technology) (Google [2] [5] ) 2. Google 2.1 Google Google [2]( 1) Google Web, Google Web Google Chrome

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: [email protected], {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

Web Basic Web SAS-2 Web SAS-2 i

Web Basic Web SAS-2 Web SAS-2 i 19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly

More information

3_23.dvi

3_23.dvi Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems

More information

WikiWeb Wiki Web Wiki 2. Wiki 1 STAR WARS [3] Wiki Wiki Wiki 2 3 Wiki 5W1H 3 2.1 Wiki Web 2.2 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 2.3 Wiki 2015 Informa

WikiWeb Wiki Web Wiki 2. Wiki 1 STAR WARS [3] Wiki Wiki Wiki 2 3 Wiki 5W1H 3 2.1 Wiki Web 2.2 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 2.3 Wiki 2015 Informa 情 報 処 理 学 会 インタラクション 2015 IPSJ Interaction 2015 A17 2015/3/5 Web 1 1 1 Web Web Position and Time based Summary System using Story Style for Web Contents Daichi Ariyama 1 Daichi Ando 1 Shinichi Kasahara

More information

口サイトでは IP アドレスやリファラ情報などを基にクライアントハニーポットによるアクセスを判断し 正規の Web サイトに転送することで検知を回避する仕組み ( クローキング ) が備わっていることも多い 入口サイトから攻撃サイトへの誘導では複数の中継サイトを経由する場合があるが 最終的に攻撃サイ

口サイトでは IP アドレスやリファラ情報などを基にクライアントハニーポットによるアクセスを判断し 正規の Web サイトに転送することで検知を回避する仕組み ( クローキング ) が備わっていることも多い 入口サイトから攻撃サイトへの誘導では複数の中継サイトを経由する場合があるが 最終的に攻撃サイ 5-2 DBD 攻撃対策フレームワーク 笠間貴弘松中隆志山田明窪田歩藤原信代川守田和男岡田晃市郎 Web ブラウザやプラグインの脆弱性を悪用することで Web サイトにアクセスしたユーザに気づかれないうちにマルウェアに感染させる Drive-by-Download 攻撃 ( 以下 DBD 攻撃 ) の被害が多発している 本稿では この DBD 攻撃対策を目的として研究開発を進めている DBD 攻撃対策フレームにワークについて概説し

More information

Drive-by-Download JavaScript

Drive-by-Download JavaScript JAIST Reposi https://dspace.j Title Drive-by-Download 攻撃予測のための難読化 JavaScript の検知に関する研究 Author(s) 本田, 仁 Citation Issue Date 2016-03 Type Thesis or Dissertation Text version author URL http://hdl.handle.net/10119/13608

More information

農研機構 食品総合研究所 研究報告 77号

農研機構 食品総合研究所 研究報告 77号 Rep. Natl Food Res. InstNo 技 術 報 告 食 品 害 虫 サイトの 長 期 間 アクセス 解 析 --- A Long-Term Analysis of Access Trend to Food-Insect Site Yukio Magariyama, Kumiko Shichiri, Akihiro Miyanoshita, Taro Imamura, Satoshi

More information

DEIM Forum 2010 A3-3 Web Web Web Web Web. Web Abstract Web-page R

DEIM Forum 2010 A3-3 Web Web Web Web Web. Web Abstract Web-page R DEIM Forum 2010 A3-3 Web Web 305 8550 1 2 305 8550 1 2 E-mail: [email protected], [email protected] Web Web Web. Web Abstract Web-page Recommendation System based on the Keyword transitions

More information

dews2004-final.dvi

dews2004-final.dvi DEWS2004 I-10-04 606 8501 E-mail: {akahoshi,hirotanaka,tanaka}@dl.kuis.kyoto-u.ac.jp A Basic Study on Ubiquitous Hypermedia Model Yuhei AKAHOSHI, Hiroya TANAKA, and Katsumi TANAKA Graduate School of Informatics,

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i 26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append

More information

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU 1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale

More information

Microsoft Word - deim2011_new-ichinose-20110325.doc

Microsoft Word - deim2011_new-ichinose-20110325.doc DEIM Forum 2011 B7-4 252-0882 5322 E-mail: {t08099ai, kurabaya, kiyoki}@sfc.keio.ac.jp A Music Search Database System with a Selector for Impressive-Sections of Continuous Data Aya ICHINOSE Shuichi KURABAYASHI

More information

ITAOI2003第三屆離島資訊與應用研討會論文範例

ITAOI2003第三屆離島資訊與應用研討會論文範例 2003 6 [email protected], [email protected], [email protected] (Internet) and build up cache proxy servers. In this paper, we (Multi-media) design and development four proxy servers

More information

企業内システムにおけるA j a x 技術の利用

企業内システムにおけるA j a x 技術の利用 Utilization of Ajax in Enterprise Intranet Systemsby Tetsuo Yamashita, Takeshi Kuroe and Kazuhisa Ikeda Enterprise 2.0 refers to the recent trend of applying the web technologies widely deployed in Internet

More information

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi- 1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,

More information

17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki

More information

DEIM Forum 2012 E Web Extracting Modification of Objec

DEIM Forum 2012 E Web Extracting Modification of Objec DEIM Forum 2012 E4-2 670 0092 1 1 12 E-mail: [email protected], {dkitayama,sumiya}@shse.u-hyogo.ac.jp Web Extracting Modification of Objects for Supporting Map Browsing Junki MATSUO, Daisuke

More information

ohp.mgp

ohp.mgp 2019/06/11 A/B -- HTML/WWW(World Wide Web -- (TA:, [ 1 ] !!? Web Page http://edu-gw2.math.cst.nihon-u.ac.jp/~kurino VNC Server Address : 10.9.209.159 Password : vnc-2019 (2019/06/04 : : * * / / : (cf.

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

1 1 tf-idf tf-idf i

1 1 tf-idf tf-idf i 14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles

More information

,,.,.,,.,.,.,.,,.,..,,,, i

,,.,.,,.,.,.,.,,.,..,,,, i 22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

1 Fig. 2 2 Fig. 1 Sample of tab UI 1 Fig. 1 that changes by clicking tab 5 2. Web HTML Adobe Flash Web ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) 3 Web 2.1 Web Goo

1 Fig. 2 2 Fig. 1 Sample of tab UI 1 Fig. 1 that changes by clicking tab 5 2. Web HTML Adobe Flash Web ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) 3 Web 2.1 Web Goo Web 1,a) 1,b) Web Web HTML Indicating Important Parts in Searched Web Pages by Retrieval Terms Yokoo Shunichi 1,a) Yoshiura Noriaki 1,b) Abstract: Users cannot always find retrieval terms immediately in

More information