Presentation is loading. Please wait.

Presentation is loading. Please wait.

Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities Y.-M. Wang, D. Beck, X. Jiang in Proceedings of.

Similar presentations


Presentation on theme: "Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities Y.-M. Wang, D. Beck, X. Jiang in Proceedings of."— Presentation transcript:

1 Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities Y.-M. Wang, D. Beck, X. Jiang in Proceedings of the 13th Annual Network and Distributed Systems Security Symposium (NDSS 2006), The Internet Society, 2006. Presenter: Sangyup Lee

2 Summary Introduces the concept of Automated Web Patrol  Basic aim is at protecting Internet users Design and Implementation of the system Effectiveness of the system is demonstrated through a series of experiments

3 What is the Strider HoneyMonkey Exploit Detection System? A pipeline of VM-based honeypots that run monkey programs which patrols the web automatically in an attempt to mimic human web browsing.  Honeypot A trap to catch malice Records attacker’s information

4 What is the Strider HoneyMonkey Exploit Detection System? (contd.)  Pipeline Consists of 3 stages Stage 1: Exploit Site Detection on un-patched VMs Stage 2: Recursive Redirection Analysis on un-patched VMs Stage 3: Recursive Redirection Analysis with partially and fully patched VMs Exploit detection by detecting persistent-state changes

5 Appreciative Comment A good way of approaching the solution to the growing problem of browser-based attacks  Concept of prevention  Possible developments in future

6 Critical Comments #1 Only one type of web browser used in the experiments – Internet Explorer 6.0  Should have taken into account other popular browsers such as Firefox

7 Critical Comments #2 “…to seek out and classify web sites that exploit browser vulnerabilities.” Ambiguous use of different Windows XP Service Pack versions on the tested machines.  Is it the OS or the browser that’s vulnerable?  Other factors that might affect the vulnerability? Number of Exploit-URLsNumber of Exploit Sites SP1 Unpatched (SP2-UP)688268 SP2 Unpatched (SP2-UP)204115

8 Further Analysis “if I never visit those risky web sites that serve dangerous or questionable content, do I have to worry about vulnerability exploits?” Suspicious ListPopular List # URLs scanned16,1901,000,000 # Exploit URLs206 (1.28%)710 (0.071%) “They don’t buy it because the danger is small and because security is a pain.” – B. Lampson

9 Discussion Can you think of any other factors that might affect the vulnerability of your machine against browser-based attacks?


Download ppt "Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities Y.-M. Wang, D. Beck, X. Jiang in Proceedings of."

Similar presentations


Ads by Google