Academic literature on the topic 'Drive-by download'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Drive-by download.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Drive-by download"
ZHANG, Hui-Lin, Wei ZOU, and Xin-Hui HAN. "Drive-by-Download Mechanisms and Defenses." Journal of Software 24, no. 4 (January 14, 2014): 843–58. http://dx.doi.org/10.3724/sp.j.1001.2013.04376.
Full textSood, Aditya K., and Sherali Zeadally. "Drive-By Download Attacks: A Comparative Study." IT Professional 18, no. 5 (September 2016): 18–25. http://dx.doi.org/10.1109/mitp.2016.85.
Full textJaved, Amir, Pete Burnap, and Omer Rana. "Prediction of drive-by download attacks on Twitter." Information Processing & Management 56, no. 3 (May 2019): 1133–45. http://dx.doi.org/10.1016/j.ipm.2018.02.003.
Full textJaved, Amir, Pete Burnap, Matthew L. Williams, and Omer F. Rana. "Emotions Behind Drive-by Download Propagation on Twitter." ACM Transactions on the Web 14, no. 4 (September 4, 2020): 1–26. http://dx.doi.org/10.1145/3408894.
Full textNag, Amruth, and Sowmya M S. "Solution for Deceptive Download Buttons and Drive-By Installation." International Journal of System Modeling and Simulation 3, no. 4 (December 30, 2018): 1. http://dx.doi.org/10.24178/ijsms.2018.3.4.01.
Full textAldwairi, Monther, Musaab Hasan, and Zayed Balbahaith. "Detection of Drive-by Download Attacks Using Machine Learning Approach." International Journal of Information Security and Privacy 11, no. 4 (October 2017): 16–28. http://dx.doi.org/10.4018/ijisp.2017100102.
Full textTAKATA, Yuta, Mitsuaki AKIYAMA, Takeshi YAGI, Takeo HARIU, and Shigeki GOTO. "MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks." IEICE Transactions on Information and Systems E99.D, no. 4 (2016): 860–72. http://dx.doi.org/10.1587/transinf.2015icp0013.
Full textJayasinghe, Gaya K., J. Shane Culpepper, and Peter Bertok. "Efficient and effective realtime prediction of drive-by download attacks." Journal of Network and Computer Applications 38 (February 2014): 135–49. http://dx.doi.org/10.1016/j.jnca.2013.03.009.
Full textHsu, Fu-Hau, Chang-Kuo Tso, Yi-Chun Yeh, Wei-Jen Wang, and Li-Han Chen. "BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks." IEEE Journal on Selected Areas in Communications 29, no. 7 (August 2011): 1461–68. http://dx.doi.org/10.1109/jsac.2011.110811.
Full textNappa, Antonio, M. Zubair Rafique, and Juan Caballero. "The MALICIA dataset: identification and analysis of drive-by download operations." International Journal of Information Security 14, no. 1 (June 21, 2014): 15–33. http://dx.doi.org/10.1007/s10207-014-0248-7.
Full textDissertations / Theses on the topic "Drive-by download"
Puttaroo, Mohammad Ally Rehaz. "A behavioural study in runtime analysis environments and drive-by download attacks." Thesis, University of West London, 2017. https://repository.uwl.ac.uk/id/eprint/4751/.
Full textXu, Kui. "Anomaly Detection Through System and Program Behavior Modeling." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/51140.
Full textPh. D.
Canali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0009/document.
Full textThe incredible growth of the World Wide Web has allowed society to create new jobs, marketplaces, as well as new ways of sharing information and money. Unfortunately, however, the web also attracts miscreants who see it as a means of making money by abusing services and other people's property. In this dissertation, we perform a multidimensional analysis of attacks involving malicious or compromised websites, by observing that, while web attacks can be very complex in nature, they generally involve four main actors. These are the attackers, the vulnerable websites hosted on the premises of hosting providers, the web users who end up being victims of attacks, and the security companies who scan the Internet trying to block malicious or compromised websites. In particular, we first analyze web attacks from a hosting provider's point of view, showing that, while simple and free security measures should allow to detect simple signs of compromise on customers' websites, most hosting providers fail to do so. Second, we switch our point of view on the attackers, by studying their modus operandi and their goals in a distributed experiment involving the collection of attacks performed against hundreds of vulnerable web sites. Third, we observe the behavior of victims of web attacks, based on the analysis of their browsing habits. This allows us to understand if it would be feasible to build risk profiles for web users, similarly to what insurance companies do. Finally, we adopt the point of view of security companies and focus on finding an efficient solution to detecting web attacks that spread on compromised websites, and infect thousands of web users every day
Nelms, Terry Lee. "Improving detection and annotation of malware downloads and infections through deep packet inspection." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/54941.
Full textBarwinski, Mark Andrei. "Taxonomy of spyware and empirical study of network drive-by-downloads." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FBarwinski.pdf.
Full textThesis Advisor(s): Cynthia E. Irvine, Tim E. Levin. Includes bibliographical references (p. 115-120). Also available online.
Canali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0009.
Full textThe incredible growth of the World Wide Web has allowed society to create new jobs, marketplaces, as well as new ways of sharing information and money. Unfortunately, however, the web also attracts miscreants who see it as a means of making money by abusing services and other people's property. In this dissertation, we perform a multidimensional analysis of attacks involving malicious or compromised websites, by observing that, while web attacks can be very complex in nature, they generally involve four main actors. These are the attackers, the vulnerable websites hosted on the premises of hosting providers, the web users who end up being victims of attacks, and the security companies who scan the Internet trying to block malicious or compromised websites. In particular, we first analyze web attacks from a hosting provider's point of view, showing that, while simple and free security measures should allow to detect simple signs of compromise on customers' websites, most hosting providers fail to do so. Second, we switch our point of view on the attackers, by studying their modus operandi and their goals in a distributed experiment involving the collection of attacks performed against hundreds of vulnerable web sites. Third, we observe the behavior of victims of web attacks, based on the analysis of their browsing habits. This allows us to understand if it would be feasible to build risk profiles for web users, similarly to what insurance companies do. Finally, we adopt the point of view of security companies and focus on finding an efficient solution to detecting web attacks that spread on compromised websites, and infect thousands of web users every day
Šulák, Ladislav. "Detekce škodlivých webových stránek pomocí strojového učení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385990.
Full textHuang, Jhe-Jhun, and 黃哲諄. "Detecting Drive-by Download Based on Reputation System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/76445739504789070296.
Full text國立中山大學
資訊管理學系研究所
100
Drive-by download is a sort of network attack which uses different techniques to plant malicious codes in their computers. It makes the traditional intrusion detection systems and firewalls nonfunctional in the reason that those devices could not detect web-based threats. The Crawler-based approach has been proposed by many studies to discover drive-by download sites. However, the Crawler-based approach could not simulate the real user behavior of web browsing when drive-by download attack happens. Therefore, this study proposes a new approach to detect drive-by download by sniffing HTTP flow. This study uses reputation system to improve the efficiency of client honeypots, and adjusts client honeypots to process the raw data of HTTP flow. In the experiment conducted in real network environment, this study show the performance of a single client honeypot could reach average 560,000 HTTP success access log per day. Even in the peak traffic, this mechanism reduced the process time to 22 hours, and detected drive-by download sites that users were actually browsing. Reputation system in this study is applicable to varieties of domain names because it does not refer to online WHOIS database. It established classification model on machine learning in 12 features. The correct classification rate of the reputation system applied in this study is 90.9%. Compared with other Reputation System studies, this study not only extract features from DNS A-Type but also extract features from DNS NS-Type. The experiment results show the Error Rate of the new features from DNS NS-Type is only 19.03%.
Tso, Chang-kuo, and 左昌國. "A Browser-side Solution to Drive-by-Download-Based Malicious Web Pages." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/39600613133264153315.
Full text國立中央大學
資訊工程研究所
97
As Internet plays an important role for more people in their life, more malicious attackers have changed the targets from web servers of enterprises or organizations to personal computer users by infecting computers with malware or adware for financial gains. In order to compromise the computers of end users which usually don’t provide popular services for traditional infection routine, web-based attack has become an effective method to infect personal computers. In recently years, a notorious web-based attack mechanism, called “drive-by downloads”, makes numbers of hosts infected by malware. Attackers inject malicious contents into webpage stored in vulnerable web server via common attacking techniques like SQL injection. Victims then visit these webpage without alertness because these malicious contents are invisible to them except that they check the source code carefully. When vulnerable browsers read these malicious contests, they secretly download and automatically install harmful binaries in background. This paper introduces a browser-side solution to prevent web browsers from executing binaries downloaded by drive-by downloads. We do not have to analyze the source code of webpage but focus on blocking browsers from executing the binary which has the “secretly download” characteristic. This solution currently works on Internet Explorer 7.0 on Microsoft Windows with low overhead and low false rate.
Chiang, Ming-Chung, and 江明駿. "A Hierarchical Classifier on Web Proxies for Detecting Drive-by Download Attacks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/01860436264285021593.
Full textBook chapters on the topic "Drive-by download"
Boggs, Nathaniel, Senyao Du, and Salvatore J. Stolfo. "Measuring Drive-by Download Defense in Depth." In Research in Attacks, Intrusions and Defenses, 172–91. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11379-1_9.
Full textJoshi, Gireesh, R. Padmavathy, Anil Pinapati, and Mani Bhushan Kumar. "BrowserGuard2: A Solution for Drive-by-Download Attacks." In Lecture Notes in Electrical Engineering, 739–50. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8234-4_59.
Full textEgele, Manuel, Engin Kirda, and Christopher Kruegel. "Mitigating Drive-By Download Attacks: Challenges and Open Problems." In iNetSec 2009 – Open Research Problems in Network Security, 52–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05437-2_5.
Full textGhafir, Ibrahim, and Vaclav Prenosil. "Malicious File Hash Detection and Drive-by Download Attacks." In Advances in Intelligent Systems and Computing, 661–69. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2517-1_63.
Full textLu, Long, Vinod Yegneswaran, Phillip Porras, and Wenke Lee. "BLADE: Slashing the Invisible Channel of Drive-by Download Malware." In Lecture Notes in Computer Science, 350–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04342-0_20.
Full textEndicott-Popovsky, Barbara, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O’Neil, and Chiraag Aval. "Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks." In Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 138–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02812-0_17.
Full textVyawahare, Madhura, and Madhumita Chatterjee. "Survey on Detection and Prediction Techniques of Drive-by Download Attack in OSN." In Algorithms for Intelligent Systems, 453–63. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3242-9_42.
Full textNappa, Antonio, M. Zubair Rafique, and Juan Caballero. "Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting." In Detection of Intrusions and Malware, and Vulnerability Assessment, 1–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39235-1_1.
Full textPoornachandran, Prabaharan, S. Praveen, Aravind Ashok, Manu R. Krishnan, and K. P. Soman. "Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines." In Advances in Intelligent Systems and Computing, 129–37. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3156-4_13.
Full textIbrahim, Saeed, Nawwaf Al Herami, Ebrahim Al Naqbi, and Monther Aldwairi. "Detection and Analysis of Drive-by Downloads and Malicious Websites." In Communications in Computer and Information Science, 72–86. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4825-3_6.
Full textConference papers on the topic "Drive-by download"
Kikuchi, Hiroaki, Hiroaki Matsumoto, and Hiroshi Ishii. "Automated Detection of Drive-By Download Attack." In 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2015. http://dx.doi.org/10.1109/imis.2015.71.
Full textSinghal, Mohit, and David Levine. "Analysis and Categorization of Drive-by Download Malware." In 2019 4th International Conference on Computing, Communications and Security (ICCCS). IEEE, 2019. http://dx.doi.org/10.1109/cccs.2019.8888147.
Full textTyagi, Akshay, Laxmi Ahuja, Sunil Kumar Khatri, and Subhranil Som. "Prevention of Drive by Download Attack (URL Malware Detector)." In 2019 Third International Conference on Inventive Systems and Control (ICISC). IEEE, 2019. http://dx.doi.org/10.1109/icisc44355.2019.9036341.
Full textTakada, Tetsuji, and Katsuhiro Amako. "A Visual Approach to Detecting Drive-by Download Attacks." In VINCI '15: The 8th International Symposium on Visual Information Communication and Interaction. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2801040.2801070.
Full textSong, Chengyu, Jianwei Zhuge, Xinhui Han, and Zhiyuan Ye. "Preventing drive-by download via inter-module communication monitoring." In the 5th ACM Symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1755688.1755705.
Full textTakata, Yuta, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, and Shigeki Goto. "MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks." In 2015 IEEE 39th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2015. http://dx.doi.org/10.1109/compsac.2015.76.
Full textCherukuri, Manoj, Srinivas Mukkamala, and Dongwan Shin. "Similarity Analysis of Shellcodes in Drive-by Download Attack Kits." In 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. IEEE, 2012. http://dx.doi.org/10.4108/icst.collaboratecom.2012.250507.
Full textCherukuri, Manoj, Srinivas Mukkamala, and Dongwan Shin. "Detection of Plugin Misuse Drive-By Download Attacks using Kernel Machines." In 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. ICST, 2014. http://dx.doi.org/10.4108/icst.collaboratecom.2014.257749.
Full textPriya M, Sandhya L., and Ciza Thomas. "A static approach to detect drive-by-download attacks on webpages." In 2013 International Conference on Control Communication and Computing (ICCC). IEEE, 2013. http://dx.doi.org/10.1109/iccc.2013.6731668.
Full textAdachi, Takashi, and Kazumasa Omote. "An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode." In 2015 10th Asia Joint Conference on Information Security (AsiaJCIS). IEEE, 2015. http://dx.doi.org/10.1109/asiajcis.2015.17.
Full textReports on the topic "Drive-by download"
Unknown, Author. L51658 Subsea Pig Recovery Concepts. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), October 1991. http://dx.doi.org/10.55274/r0010603.
Full text