Presentation | 2014-07-04 Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell Masaki KAMIZONO, Yuji HOSHIZAWA, Takahiro KASAMA, Masashi ETO, Daisuke INOUE, Katsunari YOSHIOKA, Tsutomu MATSUMOTO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Recent web based cyber-attacks are commonly performed by combining multiple malicious web sites to conduct sophisticated attacks, which have different roles from each other. We call those web resources "Cyber-attack Infrastructure", which are consisting of legitimate web servers that are controlled by attackers. In order to construct such cyber-attack infrastructure, attackers often apply backdoor shell to compromise legitimate web servers. Therefore, in order to establish efficient countermeasures against web based cyber-attacks, it is important to grasp the overview of web-based cyber-attacks. This paper proposes a method to reveal and analyze structures of the web-based cyber-attack platform, which focuses on backdoor shell that are used to compromise legitimate web servers. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Cyber Attack / Backdoor Shell / Malicious Website / Drive-by Download Attack |
Paper # | ISEC2014-46,SITE2014-41,ICSS2014-50,EMM2014-46 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2014/6/26(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell |
Sub Title (in English) | |
Keyword(1) | Cyber Attack |
Keyword(2) | Backdoor Shell |
Keyword(3) | Malicious Website |
Keyword(4) | Drive-by Download Attack |
1st Author's Name | Masaki KAMIZONO |
1st Author's Affiliation | Yokohama National University:National Institute of Information and Communications Technology() |
2nd Author's Name | Yuji HOSHIZAWA |
2nd Author's Affiliation | Advanced Research Laboratory, Securebrain Corporation |
3rd Author's Name | Takahiro KASAMA |
3rd Author's Affiliation | National Institute of Information and Communications Technology |
4th Author's Name | Masashi ETO |
4th Author's Affiliation | National Institute of Information and Communications Technology |
5th Author's Name | Daisuke INOUE |
5th Author's Affiliation | National Institute of Information and Communications Technology |
6th Author's Name | Katsunari YOSHIOKA |
6th Author's Affiliation | Yokohama National University |
7th Author's Name | Tsutomu MATSUMOTO |
7th Author's Affiliation | Yokohama National University |
Date | 2014-07-04 |
Paper # | ISEC2014-46,SITE2014-41,ICSS2014-50,EMM2014-46 |
Volume (vol) | vol.114 |
Number (no) | 117 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |