I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains

I see EK: A lightweight technique to reveal exploit kit family by overall URL patterns of infection chains

The prevalence and nonstop evolving technical sophistication of exploit kits (EKs) is one of the mostchallenging shifts in the modern cybercrime landscape. Over the last few years, malware infections via drive-by downloadattacks have been orchestrated with EK infrastructures. Malicious advertisements and compromised websites redirectvictim browsers to web-based EK families that are assembled to exploit client-side vulnerabilities and finally deliverevil payloads. A key observation is that while the webpage contents have drastic differences between distinct intrusionsexecuted through the same EK, the patterns in URL addresses stay similar. This is due to the fact that autogeneratedURLs by EK platforms follow specific templates. This practice in use enables the development of an efficient systemthat is capable of classifying the responsible EK instances. This paper proposes novel URL features and a new techniqueto quickly categorize EK families with high accuracy using machine learning algorithms. Rather than analyzing eachURL individually, the proposed overall URL patterns approach examines all URLs associated with an EK infectionautomatically. The method has been evaluated with a popular and publicly available dataset that contains 240 differentreal-world infection cases involving over 2250 URLs, the incidents being linked with the 4 major EK flavors that occurredthroughout the year 2016. The system achieves up to 100% classification accuracy with the tested estimators.

___

  • [1] Provos N, Mavrommatis P, Rajab MA, Monrose F. All your iframes point to us. In: Proceedings of the 17th Usenix Conference on Security Symposium; San Jose, CA, USA; 2008. pp. 1–16.
  • [2] Wang YM, Beck D, Jiang X, Roussev R. Automated web patrol with strider honeymonkeys: finding web sites that exploit browser vulnerabilities. In: Proceedings of the 13th Annual Network and Distributed System Security Symposium; San Diego, CA, USA; 2006. pp. 35–49.
  • [3] Provos N, McNamee D, Mavrommatis P, Wang K, Modadugu N. The ghost in the browser analysis of web-based malware. In: Proceedings of the 1st Usenix Workshop on Hot Topics in Understanding Botnets; Cambridge, MA, USA; 2007. p. 4.
  • [4] Seifert C, Welch I, Komisarczuk P. HoneyC - The low-interaction client honeypot. In: Proceedings of the New Zealand Computer Science Research Student Conference; Hamilton, New Zealand; 2007. pp. 1–9.
  • [5] Moshchuk A, Bragin T, Deville D, Gribble SD, Levy HM. SpyProxy: Execution-based detection of malicious web content. In: Proceedings of the 16th Usenix Conference on Security Symposium; Boston, MA, USA; 2007. pp. 1-16.
  • [6] Nazario J. A virtual client honeypot. In: Proceedings of the 2nd Usenix Workshop on Large-Scale Exploits and Emergent Threats; Boston, MA, USA; 2009. pp. 911-919.
  • [7] Zhang J, Seifert C, Lee W, Stokes JW. ARROW: Generating signatures to detect drive-by downloads. In: Proceedings. of the 20th International Conference on World Wide Web; Hyderabad, India; 2011. pp. 187–196.
  • [8] Grier C, Pitsillidis A, Provos N, Rafique MZ, Rajab MA et al. Manufacturing compromise: The emergence of exploit-as-a-service. In: Proceedings of the 19th ACM Conference on Computer and Communications Security; Raleigh, NC, USA; 2012. pp. 821–832.
  • [9] Kotov V, Massacci F. Anatomy of exploit kits: preliminary analysis of exploit kits as software artefacts. In: Proceedings of the 5th International Symposium on Engineering Secure Software and Systems; Paris, France; 2013. pp. 181–196.
  • [10] Allodi L, Kotov V, Massacci F. MalwareLab: Experimentation with cybercrime attack tools. In: Proceedings of the 6th Usenix Workshop on Cyber Security Experimentation and Test; Washington, DC, USA; 2013. pp. 1–8.
  • [11] De Maio G, Kapravelos A, Shoshitaishvili Y, Kruegel C, Vigna G. PExy: The other side of exploit kits. In: Proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment; Egham, UK; 2014. pp. 132–151.
  • [12] Eshete B, Venkatakrishnan VN. WebWinnow: Leveraging exploit kit workflows to detect malicious urls. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy; San Antonio, TX, USA; 2014. pp. 305–312.
  • [13] Taylor T, Hu X, Wang T, Jang J, Stoecklin MP et al. Detecting malicious exploit kits using tree-based similarity searches. In: Proceedings of the 6th ACM Conference on Data and Application Security and Privacy; San Antonio, TX, USA; 2016. pp. 255–266.
  • [14] Taylor T. Using context to improve network-based exploit kit detection. PhD, University of North Carolina, Chapel Hill, NC, USA, 2016.
  • [15] Stock B, Livshits B, Zorn B. Kizzle: A signature compiler for detecting exploit kits. In: Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks; Toulouse, France; 2013. pp. 455–466.
  • [16] Jayasinghe GK, Culpepper JS, Bertok P. Efficient and effective realtime prediction of drive-by download attacks. Journal of Network Computer Application 2014; 38: 135-49.
  • [17] Nappa A, Rafique MZ, Caballero J. The MALICIA dataset: Identification and analysis of drive-by download operations. International Journal of Information Security 2015; 14 (1): 15-33.
  • [18] Sood AK, Zeadally S. Drive-by download attacks: a comparative study. IT Professional 2016; 18 (5): 18-25.
  • [19] Takata Y, Akiyama M, Yagi T, Hariu T, Goto S. MineSpider: Extracting hidden URLs behind evasive drive-by download attacks. IEICE Transactions on Information and Systems 2016; 99 (4): 860-872.
  • [20] Aldwairi M, Hasan M, Balbahaith Z. Detection of drive-by download attacks using machine learning approach. International Journal of Information Security and Privacy 2017; 11 (4): 16-28.
  • [21] Jagannatha P. Detecting exploit kits using machine learning. MSc, University of Twente, Twente, the Netherlands, 2016.
  • [22] Sandnes J. Applying machine learning for detecting exploit kit traffic. MSc, University of Oslo, Oslo, Norway, 2017.
  • [23] Suren E, Angin P. Know your EK: A content and workflow analysis approach for exploit kits. Journal of Internet Services and Information Security 2019; 9 (1): 24-47.
  • [24] Pedregosa F, Varoquaux G. Scikit-learn: Machine Learning in Python. 2011.