Landing Landing Intermediate Exploit Exploit Distribution Provos [1] Drive-by Download (Exploit Distribution ) Drive-by Download (FCDBD: Framework for

Similar documents
29 jjencode JavaScript

2 web high interaction web low interaction Capture- HPC[11] HoneyClient[5] HoneyC[12] SpyBye[7] HoneyC SpyBye snort exploit 3 Drive-by-download Web (

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

日本感性工学会論文誌

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS ) GPS Global Positioning System

i

CCC DATAset 2009 によるマルウェア配布元の可視化

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

Web Web Web Web Web IP

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

Web Basic Web SAS-2 Web SAS-2 i

( )

"CAS を利用した Single Sign On 環境の構築"

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

3_23.dvi

WikiWeb Wiki Web Wiki 2. Wiki 1 STAR WARS [3] Wiki Wiki Wiki 2 3 Wiki 5W1H Wiki Web 2.2 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 5W1H 2.3 Wiki 2015 Informa

口サイトでは IP アドレスやリファラ情報などを基にクライアントハニーポットによるアクセスを判断し 正規の Web サイトに転送することで検知を回避する仕組み ( クローキング ) が備わっていることも多い 入口サイトから攻撃サイトへの誘導では複数の中継サイトを経由する場合があるが 最終的に攻撃サイ

Drive-by-Download JavaScript

農研機構 食品総合研究所 研究報告 77号

DEIM Forum 2010 A3-3 Web Web Web Web Web. Web Abstract Web-page R

dews2004-final.dvi

Web Web Web Web Web, i

P2P P2P Winny 3 P2P P2P 1 P2P, i

"CAS を利用した Single Sign On 環境の構築"

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

Microsoft Word - deim2011_new-ichinose doc

ITAOI2003第三屆離島資訊與應用研討會論文範例

企業内システムにおけるA j a x 技術の利用

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-


DEIM Forum 2012 E Web Extracting Modification of Objec

ohp.mgp

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 1 tf-idf tf-idf i

,,.,.,,.,.,.,.,,.,..,,,, i

7,, i

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

1 Fig. 2 2 Fig. 1 Sample of tab UI 1 Fig. 1 that changes by clicking tab 5 2. Web HTML Adobe Flash Web ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) 3 Web 2.1 Web Goo

Transcription:

Drive-by Download Web 1,a) 1,b) 1,c) Web Web Web Drive-by Download FCDBD(Framework for Countering Drive-By Download) FCDBD Drive-by Download Landing Web <iframe> Landing Web JavaScript Web Drive-by Download Web A Feasibility Study for Enhancing the Framework for Countering Drive-by Download Attacks with Analysis of Web Link Structures of Websites Abstract: The authors proposed the Framework for Countering Drive-By Download (FCDBD) which monitors the Web by utilizing web access logs from users and detects malicious websites related to the drive-by download attacks. Monitoring link-related behaviors is one of the approaches to detect the malicious websites in the framework. The authors proposed a detection method for the Landing site of Drive-by Download attacks. The method focused on the change of referred websites from a webpage. However, a legitimate webpage has many changes of referred websites caused by advertisement websites or traffic analysis websites. Therefore, it is hard to extract the change caused by the defacement and detect the Landing site correctly. In this paper, the authors propose the improved method for detecting the Landing site of drive-by download attacks. Keywords: Drive-by download attack, Web link analysis 1. Drive-by Download Web Web Web 1 ( )KDDI KDDI R&D Laboratories Inc., 2 1 15 Ohara, Fujimino, Saitama 356-0003, Japan a) ta-matsunaka@kddilabs.jp b) ai-yamada@kddilabs.jp c) kubota@kddilabs.jp 1 Drive-by Download (OS ) (Exploit ) (Distribution ) Exploit (Intermediate ) Intermediate (Landing ) Landing Intermediate Exploit (JavaScript PHP ) 1

Landing Landing Intermediate Exploit Exploit Distribution Provos [1] Drive-by Download (Exploit Distribution ) Drive-by Download (FCDBD: Framework for Countering Drive-By Download) [2] [6] Web Web Web Drive-by Download Web Web Web Drive-by Download Drive-by Download [3] Web / Exploit [5] Web Landing [6] Landing JavaScript [4] Landing Web / Web Landing Landing FCDBD Web Web HTTP Request HTTP Response User Force to download malwares 1 Exploit the vulnerabilities Landing sites (defaced) Intermediate sites Drive-by Download Exploit site Distribution site (False Positives) Web 2 1 6.0% / [5] (Exploit ) 1.5% Web 2. Drive-by Download Drive-by Download Web (honeyclient) Web () [7] [8] honeyclient seed Web (cloaking) Drive-by Download Web ( ) Zhang [10] Drive-by Download HTTP URL 2

Web Access Log, Contents 2 Analysis Center Web Access Log Analysis (Web Link Analysis) Content Analysis (Dynamic/Static) The Internet Access/Download Monitoring Sensors Browser Sensor Web Proxy Sensor Users FCDBD Warnings (central server) MDN(Malware Distribution Network) central server URL MDN Stringhini [11] (OS ) Web Drive-by Download Wand [12] [10] MDN Landing HTML URL MDN URL MDN Landing MDN 3. FCDBD: Framework for Countering Drive-By Download 3.1 FCDBD FCDBD(Framework for Countering Drive-By Download) Drive-by Download [2] [6] 2 FCDBD FCDBD Web ( ) Web (Web ) Web 1 ID Web URL Web HTTP Request/Response Web 1 Web ID ID Web Web Web Web Web Web Web Landing [6] Web / Exploit [5] Web Web Drive-by Download Web [3] 2 / [13] (URL) 3

3 Exploit / Distribution Landing <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <HTML>... </DIV><!--c47665--><script type="text/javascript" src="hxxp://lodgesure.co.za/.../nfyvrkb8.php?id=2 544721"></script><!--/c47665-->... </HTML> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <HTML>... </DIV>... </HTML> 4 Landing 3.2 Web Drive-by Download FCDBD Web Drive-by Download Web [6] [5] [3] 1: Landing 3 Web Web Landing Web google twitter Alexa[14] ( 500 500) Firefox Adblock Plus[15] [6] 4 URL URL Landing 4 () <script> Web ( ) Web <script> Web Landing 2: / Exploit 5 Drive-by Download [16] D3M(Drive-by Download Dataset by Marionette) [17] 1 Web Exploit 5 Exploit Exploit Exploit (Exploit /Distribution ) Web Web Exploit Web #fanin#fan-out #fan-in > 1 #fan-out = 1 Web Exploit 4

Web 1 2014/3/3 2014/3/4 Web u 1 u 1 1. Web r 1 r 2 r 1 r 2 r 1,a 2. Web ( 1) {(Web, { })} = {(u 1, {r 1,a, r 1,b,...}),..., (u n, {r n,a,...})} 3. / ( 2) 2 (#fan-in > 1?) u 1 u 3 r 1,a Landing? Exploit? Landing : u 1,..., u m Exploit : r 1,a,..., r m,a,..., r m,l (#fan-out = 1?) r 5 7 Landing Landing site www.asu.msmu.r u/.../check.php buzziskin.net/.../ returning_depending.php www.parfumer.by /.../check.php 2 Web Web : 1,684 : 2014/3/3 2014/3/14( ) URL : 7,899 6 5 Exploit site /Distribution site buzziskin.net/.../ returning_depending.php? xxx (PDF) buzziskin.net/.../ returning_depending.php? yyy (EXE) Drive-by Download Landing #fan-in 2 Exploit #fan-out = 1 Exploit /Distribution / Exploit 4. 1 2 Landing 7 Landing Web Web Web 1 Web ( ) Web / #fan-in#fan-out #fan-in > 1 #fan-out = 1 Exploit Web Landing 5. Landing 3.2 Landing FCDBD Web Web Web Web 2 Web Web 1,684URL 1 1 2014 3 3 2014 3 14 Web URL FCDBD Web Internet Explorer 8 Web (false positives) 8 5

Web (2014/3/3 2014/3/14) Web : 1,680URL : 7,899 1. Web 2. Web ( 1) Web : 100URL(6.0%)/1 : 116 /1 3. / ( 2) 4 (87 ) Web Advertisement 29 Computers/Internet 21 Internet/Infrastructure /Search Engines/Portals 11 Business/Economy/Finantial 10 Blogs/Web Communications 3 Pornography/Adult/Mature 3 Arts/Entertainment/Games 3 Auctions/Shopping 2 Brokerages/Trading 2 Health/Society/Life Style 2 News/Media 1 Web : 24URL(1.5%)/1 : 18 /1 8 3.2 1 Web Web 1,680URL Web ( ) ( 1) Web Web / 3.2 2 (Exploit ) Web ( 2) 1 1 2 (false positives) 9 10 9 1 2 1 Web 10 1 2 1 Web 3 1 Web 3 Web 1. 9 1 78 125 (4.6% 7.5%) Web 1 83 171 (1.6% 3.2%) 10 2 408 ( 24.2%) 492 ( 2.3%) 10 1 Web 70 (4.1%) 20 (1.2%) 2. 9 1 Web 12 55 (0.7% 3.3%) 1 1 3.5% 5.8% 1 10 40 (0.2% 0.7%) 10 2 150 (8.9%) 87 (0.5%) 6. 2 87 4 Trend Micro Site Safety Center [18] Web Web (Web Advertisement) (Computer/Internet/Infrastructure) webbug Web Web / 2 / 1 2014 3 3 3 14 1 10 6

3 1 (YYMMDD) 140303 140304 140305 140306 140307 140310 140311 140312 140313 140314 Web 1,684 1,684 1,684 1,684 1,684 1,684 1,684 1,684 1,684 1,684 1,684 5,397 5,315 5,240 5,375 5,192 5,318 5,158 5,516 5,285 5,232 7,889 200 100 0 100 106 86 82 24 23 12 10 126 171 55 40 7883 120 110 15 21 10 20 9197 1211 125 161 2823 9088 12 12 119 114 140304 140305 140306 140307 140310 140311 140312 140313 140314 (YYMMDD) 3326 Web( 1) ( 1) Web( 2) ( 2) 500 400 300 200 100 9 (1 : ( 1)Web :100.2(6.0%) :116.1(2.2%) ( 2)Web :24.8(1.5%) :18.2(0.3%)) 0 140304 140305 140306 140307 140310 140311 140312 140313 140314 (YYMMDD) Web( )( 1) ( )( 1) Web( )( 2) ( )( 2) 10 ( ) / (#fan-in > 1 #fan-out = 1 ) 5 5 Drive-by Download [1] / / 1 FCDBD Landing FCDBD Landing Drive-by Download Web Web Web / Web Landing FCDBD 1.5% 100 Web 1 2 FCDBD Web 100 100 *1 1 150 URL Web 1.5% 23,000 Web Landing Exploit Web *1 7

5 2 (YYMMDD) 140303 140304 140305 140306 140307 140310 140311 140312 140313 140314 5,397 5,836 6,152 6,507 6,718 6,947 7,152 7,495 7,720 7,899 414 509 582 693 754 820 883 1,007 1,094 1,158 7.7% 8.7% 9.5% 10.7% 11.2% 11.8% 12.3% 13.4% 14.2% 14.7% Web 1 2 7. Drive-by Download Landing Web Landing Web / Web Landing 1 6.0% 1.5% FCDBD FCDBD *2 (( NICT) : : ) [1] N. Provos, P. Mavrommatis, M. A. Rajab and F. Monrose, All Your iframes Point to Us, Proc. the 17th USENIX Security Symposium, 2008. [2],,,,,, 2011(CSS2011), 2011. [3] T. Matsunaka, A. Kubota and T. Kasama, An Approach to Detect Drive-by Download by Observing the Web Page Transition Behaviors, Proc. of 9th Asia Joint Con- *2 http://www.fcdbd.jp/ ference on Information Security (AsiaJCIS2014), 2014. [4].,,,, 31 (SCIS2014), 2014. [5],,, Drive-by Download Web Web, 2014(CSS2014), 2014. [6] T. Matsunaka, J. Urakawa and A. Kubota, Detecting and Preventing Drive-by Download Attack via Participative Monitoring of the Web, Proc. of 8th Asia Joint Conference on Information Security (AsiaJCIS2013), 2013. [7] M. Akiyama, M. Iwamura, Y. Kawakoya, K. Aoki and M. Itoh, Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attack, IEEE Trans. of Communication, Vol. E93 B, No. 5, pp. 1131 1139, May. 2010. [8] Y M. Wang, D. Beck, X. Jiang, C. Verbowski, S. Chen and S. King, Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities, Proc. 13th Annual Network & Distributed System Security Symposium (NDSS2006), 2006. [9] J. W. Stokes, R. Andersen, C. Seifert and K. Chellapilla, WebCop: Locating Neighborhoods of Malware on the Web, Proc. 3rd USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET2010), 2010. [10] J. Zhang, C. Seifert, J. W. Stokes and W. Lee, ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads, Proc. 20th International World Wide Web Conference (WWW2011), 2011. [11] G. Stringhini, C. Kruegel and G. Vigna, Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages, Proc. 20th ACM Conference on Computer and Communications Security (CCS2013), 2013. [12] G. Wand, J. W. Stokes, C. Herley and D. Felstead, Detecting Malicious Landing Pages in Malware Distribution Networks, Proc. 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN2013), 2013. [13],,,,,, JavaScript, (CSEC), Vol. 2014-CSEC-64, No. 21, 2014. [14] Alexa Actionable Analytics of the Web, http://www. alexa.com. [15] Adblock Plus, https://adblockplus.org/. [16] 2014(MWS2014) http://www.iwsec.org/mws/2014/. [17],,,, MWS Datasets 2014, (CSEC) Vol. 2014-CSEC-66, No. 19, 2014. [18] Trend Micro, Site Safety Center, http://global. sitesafety.trendmicro.com/index.php. 8