Detection and Analysis of Drive-by Downloads and Malicious Websites

02/19/2020
by   Saeed Ibrahim, et al.
0

A drive by download is a download that occurs without users action or knowledge. It usually triggers an exploit of vulnerability in a browser to downloads an unknown file. The malicious program in the downloaded file installs itself on the victims machine. Moreover, the downloaded file can be camouflaged as an installer that would further install malicious software. Drive by downloads is a very good example of the exponential increase in malicious activity over the Internet and how it affects the daily use of the web. In this paper, we try to address the problem caused by drive by downloads from different standpoints. We provide in depth understanding of the difficulties in dealing with drive by downloads and suggest appropriate solutions. We propose machine learning and feature selection solutions to remedy the the drive-by download problem. Experimental results reported 98.2 precision, 98.2

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/14/2022

Toward the Detection of Polyglot Files

Standardized file formats play a key role in the development and use of ...
research
02/23/2019

Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data

Malicious web domains represent a big threat to web users' privacy and s...
research
09/20/2020

Phishing Detection Using Machine Learning Techniques

The Internet has become an indispensable part of our life, However, It a...
research
06/08/2020

Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection

Domain Name System (DNS) plays in important role in the current IP-based...
research
10/02/2021

Intensive Image Malware Analysis and Least Significant Bit Matching Steganalysis

Malware as defined by Kaspersky Labs is a type of computer program desig...
research
03/25/2019

Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with Machine learning

Abstract-Email cyber-attacks based on malicious documents have become th...
research
06/19/2020

Caveat Venditor, Used USB Drive Owner

USB drives are a great way of transferring and backing up files. The pro...

Please sign up or login with your details

Forgot password? Click here to reset