期刊文献+

网页木马机理与防御技术 被引量:30

Drive-by-Download Mechanisms and Defenses
下载PDF
导出
摘要 网页木马是一种以JavaScript,VBScript,CSS等页面元素作为攻击向量,利用浏览器及插件中的漏洞,在客户端隐蔽地下载并执行恶意程序的基于Web的客户端攻击.网页木马的表现形式是一个或一组有内嵌链接关系的页面/脚本,有漏洞的客户端在访问该(组)页面时会"过路式下载"木马等恶意程序.网页木马通过这种被动攻击模式,能隐蔽、有效地将恶意程序植入客户端,这已经成为恶意程序传播的一种重要方式.近年来,围绕网页木马的攻防博弈在持续进行.首先阐述网页木马的机理和特点,然后从检测、特征分析、防范这3个方面对网页木马防御方的研究进行总结和分析,最后对网页木马攻防双方的发展趋势进行讨论. Drive-by-Download is a Web-based attack that targets at downloading and executing malwares on the client side without the user's notice or consent. It usually takes HTML elements (e.g. JavaScript, VBScript, CSS) as attack vectors, and exploits vulnerabilities in browser and plugins to launch attacks. Drive-by-Download represents as an HTML page or a group of inline-linked HTML pages/scripts. After browsing these pages, vulnerable client sides will automatically download and execute malware. Through the pull-based attack mode, Drive-by-Download can effectively and secretly spread malware to clients and has become an important way to spread malware. In recent years, both the offense-side and defense-side make ongoing development. This paper first introduces the mechanisms and features of Drive-by-Download. Then the paper summarizes and discusses researches on detection, analysis and prevention of Drive-by-Download. Trends of Drive-by-Download and some possible research directions will be discussed at last.
出处 《软件学报》 EI CSCD 北大核心 2013年第4期843-858,共16页 Journal of Software
基金 国家自然科学基金(61003217 61003216) 发改委国家信息安全专项([2010]3044) 国家242信息安全计划(2011A40)
关键词 网页木马 客户端攻击 被挂马网页 混淆 内嵌链接 Drive-by-Download client-side attack landing page obfuscation inline linking
  • 相关文献

参考文献3

二级参考文献35

  • 1王学军,郭亚军,兰天.构造一致性判断矩阵的序关系分析法[J].东北大学学报(自然科学版),2006,27(1):115-118. 被引量:56
  • 2戴敏,黄亚楼,王维.基于文件静态信息的木马检测模型[J].计算机工程,2006,32(6):198-200. 被引量:15
  • 3吕跃进.指数标度判断矩阵的一致性检验方法[J].统计与决策,2006,22(18):31-32. 被引量:68
  • 4Egele M, Kirda E, Kruegel C. Mitigating drive by download attacks challenges and open problems [C]// Proceedings of the Open Research Problems in Network Security Workshop (iNetSec 2009). Zurich, Switzerland: Springer, 2009.
  • 5Provos N, McNamee D, Mavrommatis P, et al. The ghost in the browser: Analysis of web-based Malware [C]// Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07). Cambridge, USA: USENIX Association, 2007.
  • 6Provos N, Mavrommatis P, Rajab M, et al. All your iFRAMEs point to us [C]// Proceedings of the 17th USENIX Security Symposium (Security'08). San Jose, USA: USENIX Association, 2008.
  • 7Seifert C, Welch I, Komisarczuk P. Identification of malicious web pages with static heuristics [C]// Proceedings of the Austalasian Telecommunication Networks and Applications Conference. Adelaide, Australia: IEEE Computer Society, 2008.
  • 8Guan D, Chen C M, Luo J S, et al. Malicious web page detection based on anomaly semantics [C]// Proceedings of the 4th Joint Workshop on Information Security. Kaohsiung: National Sun Yat-sen University, 2009.
  • 9Likarish P, Jung E, Jo 1. Obfuscated malicious javascript detection using classification techniques [C]// Proceedings of the 4th International Malicious and Unwanted Software (Malware 2009). Montreal, Canada: IEEE, 2009.
  • 10Moshchuk A, Bragin T, Gribble S, et al. A crawler-based study of spyware on the web [C]// Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS'06). San Diego, USA: Internet Society, 2006.

共引文献20

同被引文献234

引证文献30

二级引证文献89

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部