DocumentCode :
612032
Title :
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures
Author :
Zhou Li ; Alrwais, Sumayah ; Yinglian Xie ; Fang Yu ; Xiaofeng Wang
fYear :
2013
fDate :
19-22 May 2013
Firstpage :
112
Lastpage :
126
Abstract :
Malicious Web activities continue to be a major threat to the safety of online Web users. Despite the plethora forms of attacks and the diversity of their delivery channels, in the back end, they are all orchestrated through malicious Web infrastructures, which enable miscreants to do business with each other and utilize others´ resources. Identifying the linchpins of the dark infrastructures and distinguishing those valuable to the adversaries from those disposable are critical for gaining an upper hand in the battle against them. In this paper, using nearly 4 million malicious URL paths crawled from different attack channels, we perform a large-scale study on the topological relations among hosts in the malicious Web infrastructure. Our study reveals the existence of a set of topologically dedicated malicious hosts that play orchestrating roles in malicious activities. They are well connected to other malicious hosts and do not receive traffic from legitimate sites. Motivated by their distinctive features in topology, we develop a graph-based approach that relies on a small set of known malicious hosts as seeds to detect dedicate malicious hosts in a large scale. Our method is general across the use of different types of seed data, and results in an expansion rate of over 12 times in detection with a low false detection rate of 2%. Many of the detected hosts operate as redirectors, in particular Traffic Distribution Systems (TDSes) that are long-lived and receive traffic from new attack campaigns over time. These TDSes play critical roles in managing malicious traffic flows. Detecting and taking down these dedicated malicious hosts can therefore have more impact on the malicious Web infrastructures than aiming at short-lived doorways or exploit sites.
Keywords :
Internet; security of data; telecommunication traffic; TDS; attack channels; dark Web; graph-based approach; linchpins; low false detection rate; malicious URL paths; malicious Web infrastructures; malicious hosts; seed data; short-lived doorways; topologically dedicated hosts; traffic distribution systems; Crawlers; Feeds; Labeling; Servers; Topology; Twitter; Uniform resource locators;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy (SP), 2013 IEEE Symposium on
Conference_Location :
Berkeley, CA
ISSN :
1081-6011
Print_ISBN :
978-1-4673-6166-8
Electronic_ISBN :
1081-6011
Type :
conf
DOI :
10.1109/SP.2013.18
Filename :
6547105
Link To Document :
بازگشت