Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13.

Similar presentations


Presentation on theme: "A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13."— Presentation transcript:

1 A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13 th Annual Network and Distributed System Security Symposium (NDSS 2006) Presented by Hao Cheng, 2006.03

2 What is Spyware? Spyware (wiki): “a broad category of malicious software designed to intercept or take partial control of a computer’s operation without the informed consent of that machine’s owner or legitimate user”. no self-replica keylogging, dialer, Trojan downloader, browser hijacker, adware.

3 from wiki Two types of spyware: –spyware-infected executables: piggy-backed spyware code attached. –drive-by download: exploit vulnerability in user’s browser.

4 Contribution A quantitative analysis of the extent of spyware content in the Web. Internet point of view, study websites. have answers to below questions:

5 . Crawl webpages –May 2005, 18.2 millions URL –Oct 2005, 21.8 millions URL Virtual Machine (VM) to sandbox and analyze malicious content spyware-infected executables: commercial anti-spyware tools Drive-by download: heuristic triggers

6 Spyware-Infected automated solution –determine whether a web object has executable software –download, install, and execute in VM –analyze, identify..

7 steps Finding executables in web –HTTP header content-type = application/octet-stream –URL has extension (.exe,.cab,.msi) –After downloading, the beginning bits in a file to identify file type. Automatic Install –use heuristic to simulate common user interaction during the process of installation.

8 steps The last step- Analyze –Lavasoft AdAware anti-spyware tool. (use signature within its detection database). –script to launch the installed software and collect the logs generated by the anti-spyware tool. –identify functions of those spywares..

9 Drive-by Download automated solution –visit potential malicious webpage in unmodified browser in a clean VM –any attempt to break out of security sandbox of browser- suspicious –perform AdAware scan to detect installed spyaware..

10 Complex web content Complex web content (JavaScript) Time bomb code (occur in some future): accelerate OS wall-clock 15 times Page-close code, simulate page-close by fetching a clear webpage to cause code insurgence. Pop-up code, wait for all pop-up window to finish loading and then closed them in order to trigger any potential codes.

11 Browser Configuration IE 6.0 on unpatched XP. cfg_y, when IE ask for permission, all approved. cfg_n, refuse all requests for permission. most malicious, simple visit a webpage will cause infection. also study Firefox, basically more secure.

12 System 10-node cluster dual-processor, 4GB RAM, 80GB disk one VM per processor

13 Performance 92 second- 1 st type spyware –1-2 second creating a VM –55 seconds installing and running executables –35 seconds AdAware Sweep –Analyze 18,782 spywares per day 11.7 second- 2 nd type spyware –6.3 second- restart a browser and load a single webpage. –108 second- AdAware pages with trigger (5%) –Analyze 14,768 pages per CPU per day

14 Executable over 2,500 web sites 8 different categories for each web site, crawl to a depth = 3 from the top page. Average 6,577 pages per site. Also crawl “random selected” web sites.

15 .

16 . some spyware has multiple functions. Summary –around 90 distinct executable spyware. –instances spread 4% of domains. –1 out of 20 executables in web are spyware. –2 new executable spywares come out per month.

17 Drive-by Download webpages selected from different categories,

18 .

19 limitation heavily rely on commercial anti-spyware software. Many computers are patched, and now less vulnerabilities.

20 Questions?


Download ppt "A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13."

Similar presentations


Ads by Google