Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites

作者: Shouhuai Xu , Kristin M. Schweitzer , Min Xu , Raymond M. Bateman , Mir Mehedi Ahsan Pritom

DOI: 10.1109/ISI49825.2020.9280522

关键词:

摘要: COVID-19 has hit hard on the global community, and organizations are working diligently to cope with new norm of "work from home". However, volume remote work is unprecedented creates opportunities for cyber attackers penetrate home computers. Attackers have been leveraging websites related names, dubbed themed malicious websites. These mostly contain false information, fake forms, fraudulent payments, scams, or payloads steal sensitive information infect victims’ In this paper, we present a data-driven study characterizing detecting Our characterization shows that agile deceptively crafty in designing geolocation targeted websites, often popular domain registrars top-level domains. detection Random Forest classifier can detect based lexical WHOIS features defined achieving 98% accuracy 2.7% false-positive rate.

参考文章(21)
Yu-Zhong Chen, Zi-Gang Huang, Shouhuai Xu, Ying-Cheng Lai, Spatiotemporal Patterns and Predictability of Cyberattacks PLOS ONE. ,vol. 10, pp. e0124472- ,(2015) , 10.1371/JOURNAL.PONE.0124472
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker, Learning to detect malicious URLs ACM Transactions on Intelligent Systems and Technology. ,vol. 2, pp. 1- 24 ,(2011) , 10.1145/1961189.1961202
Zhenxin Zhan, Maochao Xu, Shouhuai Xu, Predicting Cyber Attack Rates With Extreme Values IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 1666- 1677 ,(2015) , 10.1109/TIFS.2015.2422261
Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye, Cross-layer detection of malicious websites Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13. pp. 141- 152 ,(2013) , 10.1145/2435349.2435366
Zhenxin Zhan, Maochao Xu, Shouhuai Xu, Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study IEEE Transactions on Information Forensics and Security. ,vol. 8, pp. 1775- 1789 ,(2013) , 10.1109/TIFS.2013.2279800
Marcus Pendleton, Richard Garcia-Lebron, Jin-Hee Cho, Shouhuai Xu, A Survey on Systems Security Metrics ACM Computing Surveys. ,vol. 49, pp. 62- ,(2016) , 10.1145/3005714
Rakesh Verma, Avisha Das, What's in a URL: Fast Feature Extraction and Malicious URL Detection international workshop on security. pp. 55- 63 ,(2017) , 10.1145/3041008.3041016
Farhan Douksieh Abdi, Lian Wenjuan, Malicious URL Detection Using Convolutional Neural Network International Journal of Computer Science, Engineering and Information Technology. ,vol. 7, pp. 01- 08 ,(2017) , 10.5121/IJCSEIT.2017.7601
Huashan Chen, Jin-Hee Cho, Shouhuai Xu, Quantifying the security effectiveness of firewalls and DMZs Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security. pp. 9- ,(2018) , 10.1145/3190619.3190639
Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu, Modeling and Predicting Cyber Hacking Breaches IEEE Transactions on Information Forensics and Security. ,vol. 13, pp. 2856- 2871 ,(2018) , 10.1109/TIFS.2018.2834227