Integrated Approach of Malicious Website Detection
Journal: International Journal of Communication Network and Security (Vol.1, No. 2)Publication Date: 2013-09-26
Authors : Krishnaveni Raju; C.Chellappan;
Page : 64-67
Keywords : visibility; Attacker’s mechanism; JavaScript interpreting; Malicious Websites; Detection mechanism; Honey client;
Abstract
With the advent and the rising popularity of Internet, security is becoming one of the focal point. At present, Web sites have become the attacker’s main target. The attackers uses the strategy of embedding the HTML tags, the script tag to include Web-based Trojan scripting or redirector scripting, the embedded object tag which activates the third-party applications to display the embedded object and the advanced strategy is the ARP spoofing method to build malicious website when the attackers cannot gain control of the target website. The attacker hijacks the traffic, then injects the malicious code into the HTML responses to achieve virtual malicious websites. The malicious code embedded in the web pages by the attackers; change the display mode of the corresponding HTML tags and the respective effects invisible to the browser users. The display feature setting of embedded malicious code is detected by the abnormal visibility recognition technique which increases efficiency and reduces maintenance cost. Inclusion of the honey client increases the malicious website detection rate and speed. Most of the malicious Web pages are hence detected efficiently and the malicious code in the source code is located accurately. It can also handle End-User requests to know whether their webpage is free of Malicious codes or not.
Other Latest Articles
- Dynamic Detection of Packet Losses by CRDP
- An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
- A Novel approach for Privacy Preserving in Video using Extended Euclidean algorithm Based on Chinese remainder theorem
- Star varietal cube: A New Large Scale Parallel Interconnection Network
- An Efficient Approach Formulation of Social Groups of User Calls of GSM
Last modified: 2013-09-26 13:25:44