The defense in-depth approach to the protection for browsing users against drive-by cache attacks

Because of the evolution of cloud computing techniques, web browsing becomes the main function for persons using computers. Researchers are then devoted to the study of the attack characteristics for delaminating the attacks via Web connections. Because these defense technologies on the server side...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2015-05, Vol.8 (7), p.1422-1430
Hauptverfasser: Lai, Yeu-Pong, Wu, Wei-Feng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Because of the evolution of cloud computing techniques, web browsing becomes the main function for persons using computers. Researchers are then devoted to the study of the attack characteristics for delaminating the attacks via Web connections. Because these defense technologies on the server side have great progress, attackers therefore target to the other side, the client side of personal computers. Drive‐by download is the most commonly used method to attack client computers, which exploits software vulnerabilities on the computers to secretly download and install malware. That is used to collect information on the affected computers or take those as hops to the next victims. Because of the protection technology improved and user awareness educated, attackers developed a new variety type of attacks named ‘drive‐by cache’ that has different attack steps and counterfeit file extension from the original ‘drive‐by download’. The changes elude those existed detection methods. This paper proposed a depth defense scheme to detect and prevent this type of attacks via collaboratively many existing solutions in phases. Copyright © 2014 John Wiley & Sons, Ltd. A depth defense scheme to detect and prevent Drive‐by download attacks via collaboratively many existing solutions in five‐level phases.
ISSN:1939-0114
1939-0122
DOI:10.1002/sec.1091