2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google



Similar documents
Flash Player ローカル設定マネージャー

29 jjencode JavaScript

オンラインによる 「電子申告・納税等開始(変更等)届出書」 提出方法

Web Web Web Web Web, i

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows

Drive-by Download RIG Exploit Kit

山梨県ホームページ作成ガイドライン

LAPLINK ヘルプデスク 導入ガイド


HTTP HTTP

FileMaker Server Getting Started Guide

LANFTP 1 FTP 047 PC 016 FTP HTTP 024 iphone Camera Control Pro 2 ii

2.3 1 RIG Exploit Kit (4) 4 Exploit Kit 2.2 RIG Exploit Kit RIG Exploit Kit 1 5 (1) Web Web (2) RIG Exploit Kit URL (3) URL iframe RIG Exploit Kit (4)

3 Ubuntu Linux Ubuntu Linux Debian Linux DistroWatch.com 1 Debian Ubuntu Linux 1 Debian CD(4.1 ) Knoppix Debian CentOS Linux CentOS 1 Ubuntu L

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数

FileMaker Server 9 Getting Started Guide

Ubuntu Linux PC Ubuntu Linux (14.04 LTS, Trusty Tahr) 32bit CD 64bit CD 2. 32bit CPU 64bit 32bit PC CPU 32bit 64bit Windows 64bit 64bit. 32bit Core 64

DEIM Forum 2010 A3-3 Web Web Web Web Web. Web Abstract Web-page R

CONTENTS Web

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I


LHD-LAN_E_G_PDF.}.j...A...p65

ORCA (Online Research Control system Architecture)

e-learning e e e e e-learning 2 Web e-leaning e 4 GP 4 e-learning e-learning e-learning e LMS LMS Internet Navigware


,,,,., C Java,,.,,.,., ,,.,, i

LAN FTP 1 FTP 047 PC 016 FTP HTTP 024 iphone Camera Control Pro 2 ii

Oracle Web Conferencing Oracle Collaboration Suite 2 (9.0.4) Creation Date: May 14, 2003 Last Update: Jan 21, 2005 Version: 1.21

untitled

untitled

藤本/142‐161 日本刀鑑定用語 福田

表1-表4宅建98.indd

CCC DATAset 2009 によるマルウェア配布元の可視化

DS_BIG-IP LTM VE_jp.indd

fiš„v5.dvi

Adobe Acrobat DC 製品比較表

EPUB

Vol. 28 No. 2 Apr Web Twitter/Facebook UI Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2

PC Link Tool PC Link Tool PC Link Tool PC Link Tool

ohp.mgp

Adobe Experience Manager Document Security 11.0 Extension for Microsoft Office ヘルプ

FileMaker Instant Web Publishing Guide

内閣官房情報セキュリティセンター(NISC)

2 web high interaction web low interaction Capture- HPC[11] HoneyClient[5] HoneyC[12] SpyBye[7] HoneyC SpyBye snort exploit 3 Drive-by-download Web (

[ ] SQL Server 2005 Express Edition Microsoft SQL Server 2005 Express Edition MicrosoftWindows ServerSQL Server.NET Framework Microsoft Corporation i

名称未設定

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

ACDSee-Press-Release_0524

konicaminolta.co.jp PageScope Net Care

08encode part 2

PDFstaff PDF PDFstaff Adobe PDF PDFstaff Adobe Server 2

★保健医療科学_第67巻第2号.indb

COOLPIX S203 Software Suite CD-ROM Software Suite CD-ROM Adobe Reader Adobe Acrobat Reader Ver COOLPIX S203 3 INDEX.pdf 4 Adobe Web Sof

1 1.1 PC PC PC PC PC workstation PC hardsoft PC PC CPU 1 Gustavb, Wikimedia Commons.

2014_Apr_FSLP_A4

Express5800/53Xg, Y53Xg インストレーションガイド(Windows編)

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

Microsoft PowerPoint - 情報システム pptx

Transcription:

Drive-by Download 1,a) 1,b) Web Drive-by Download(DbD) DbD Web DbD HTTP DbD Web DbD, Drive-by Download The Network Visualization Tool for detecting the Drive-by Download attacks. Amako Katsuhiro 1,a) Takada Tetsuji 1,b) Abstract: The Drive-by Download(DbD) attack, which is one of the intrusion method of malware, is a now major threat to the Internet. Detecting the DbD attack is difficult for administrators since there are no changes on the screen. A conventional approach for these attacks mainly utilizes the logs based on character information or focus attention on the http header or redirection. We propose the network visualization tool for detecting the DbD attacks. The proposed network visualization tool makes users and administrators to take action for malware. Keywords: Visualization, Network Security, Drive-by Download 1. Drive-by Download(DbD) DbD IBM SOC [1] DbD 2012 956 2013 3,972 4.2 DbD Web DbD 1 Uniersity of Electro-Communications, Tokyo, Japan a) amako.k@uec.ac.jp b) zetaka@computer.org Web DbD Web Web DbD DbD DbD 3 1

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google Safe Browsing[6] Mcfee SiteAdvisor[7] URL DbD Web DbD URL Google Mcfee DbD IP [8] DbD 2.2 2.2.1 DbD Flow Vizulizer [2] Flow Visualizer ( 2) 2 (1) DbD (2) URL (3) URL (1),(2),(3) DbD 2.2.2 Gumbler PC [3] Gumbler 2

PC PC Gumbler FTP FTP (1) (2) FTP ( ) 2.2.3 [5] DbD DbD DbD (1)HTTP (2) URL (3)PDF SWF URL 3. 1 DbD DbD URL DbD DbD DbD DbD [2] Flow Vizulizer [3] DbD Gumbler DbD 3 [5] DbD DbD 4. 3 DbD DbD Drive-by Download HTTP IP DbD DbD [4] IP DbD 4.1 3 3

(pcap) 3 Pcap TCP/IP ( ) TCP HTTP HTTP HTML HTTP HTTP HTTP HTTP TCP HTTP HTTP HTTP HTTP HTTP Python3.3 pcap pypacker Java 4.2 4 IP IP IP 0.0.0.0 255.255.255.255 pcap 30 30 HTTP HTTP IP HTTP HTTP IP HTTP HTTP HTTP HTTP HTTP Content-Type DbD Adobe Flash Player Small Web Format Adobe Reader Portable Document Format Oracle Java Java Archive Windows HTTP 4.3 JavaScript HTTP HTTP 5 DbD HTTP HTTP ( 1 ) HTTP 300 HTTP HTTP ( 2 ) 1 HTTP HTTP (1) JavaScript HTTP 300 JavaScript DbD JavaScript JavaScript JavaScript URL 1 HTTP 5. 5.1 Web CiNii[9] PDF 4.3 6 4

4 5 (4) IP 2 2 IP IP (5) PDF 6 PDF Web DbD 6 CiNii 6 5.2 Malware Dataset Drive-by Download Dataset by Mrionette(D3M)[10] DbD NTT Marionette DbD 7 D3M 7 (6) 20 02 09 PDF PDF 7 (7) HTTP 5

7 D3M 8 Web HTTP IP IP 7 HTTP (6) IP (7) PDF (8) 1 PDF HTTP PDF JavaScript URL 5.3 OS Web DbD HTTP 8 1 urlquery[11] DbD Web urlquery[11] Web Web 8 (10) 8 (11) IP 8 (9) IP DbD HTML 1 Web OS Ubuntu 12.04 LTS CPU Core i7-3770k RAM 16GB Virtualbox 4.3.6 OS Windows XP Professional SP3 InternetExplorer 6.0.2900.5512 Adobe Reader 9.0, Adobe Flash 11.1.102.55, Oracle Java Ver.6 Update 10 Apple QuickTime 7.6 HTTP/1.1 302 Moved Temporarily Server: nginx Date: Wed, 05 Feb 2014 09:55:17 GMT Content-Type: application/octet-stream Transfer-Encoding: chunked Connection: keep-alive P3P: CUR ADM OUR NOR STA NID Location: http://xx.xxxxxxx.jp/yie/ld/gcs?v=zzh... 0 9 HTTP JavaScript Content-Type application/octet-stream HTTP ( 9) 6

6. Drive-by Download HTTP IP JavaScript JavaScript JavaScript 4.3 JavaScript 7. DbD DbD DbD JavaScript DbD [1] 2013 Tokyo SOC, IBM Security Services, http://www- 935.ibm.com/services/jp/its/pdf/tokyo soc report2013 h1.pdf ( 2014-02-13) [2],,, :, 2012, p.224-231,2012. [3],, : Gumbler PC, IEICE Technical Report, IA2010-1, ICSS2010-1, 2010. [4] Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk, Anatomy of drive-by download attack, in Proc. AISC, 2013. [5],,,,,, p.765-770, 2010. [6] Google Safe Browsing, https://www.google.com/transparencyreport/safebrowsing/ ( 2014-02-13) [7] Mcfee SiteAdvisor, http://www.siteadvisor.com/ ( 2014-02-13) [8] JSOC INSIGHT 2013 vol.2, http://www.lac.co.jp/security/report/2013/11/06 jsoc 01.html ( 2014-02-13) [9] CiNii Articles - -, http://ci.nii.ac.jp/ [10],,, : MWS Datasets 2013, CSS2013, 2013. [11] URLQuery, https://urlquery.net/ ( 2014-02-13) 7