Presentation 2014-03-27
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites
Mitsuaki AKIYAMA, Takeshi YAGI, Takeo HARIU,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Attackers continuously generate URLs and FQDNs of malicious websites in order to circumvent security countermeasures using blacklist. If we permanently register them in blacklist, the number of blacklist entity is unlimitedly increasing. To solve this problem, malicious entries should be unregistered in blacklist in a timely manner when malicious websites are unused by attackers. However, malicious websites usually conduct cloaking techniques to circumvent or interfere with security inspection. Cloaking techniques interfere with measuring the lifetime of malicious website. In this paper, we propose a novel method for estimating the lifetime of malicious website focusing on the redirect destinations from compromised websites. We deployed an original decoy system and continuously observed for website compromising. We report the analytical result of malicious websites based on our obtained data.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Malicious website / blacklist / lifetime
Paper # ICSS2013-71
Date of Issue

Conference Information
Committee ICSS
Conference Date 2014/3/20(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites
Sub Title (in English)
Keyword(1) Malicious website
Keyword(2) blacklist
Keyword(3) lifetime
1st Author's Name Mitsuaki AKIYAMA
1st Author's Affiliation NTT corporation, NTT Secure Platform Laboratories()
2nd Author's Name Takeshi YAGI
2nd Author's Affiliation NTT corporation, NTT Secure Platform Laboratories
3rd Author's Name Takeo HARIU
3rd Author's Affiliation NTT corporation, NTT Secure Platform Laboratories
Date 2014-03-27
Paper # ICSS2013-71
Volume (vol) vol.113
Number (no) 502
Page pp.pp.-
#Pages 6
Date of Issue