Detecting malicious activities with user-agent-based profiles

Cited 5 time in webofscience Cited 11 time in scopus
  • Hit : 571
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorZhang, Yangko
dc.contributor.authorMekky, Heshamko
dc.contributor.authorZhang, Zhi-Liko
dc.contributor.authorTorres, Rubenko
dc.contributor.authorLee, Sung-Juko
dc.contributor.authorTongaonkar, Alokko
dc.contributor.authorMellia, Marcoko
dc.date.accessioned2016-04-12T08:19:52Z-
dc.date.available2016-04-12T08:19:52Z-
dc.date.created2015-10-02-
dc.date.created2015-10-02-
dc.date.issued2015-09-
dc.identifier.citationINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, v.25, no.5, pp.306 - 319-
dc.identifier.issn1055-7148-
dc.identifier.urihttp://hdl.handle.net/10203/203524-
dc.description.abstractHypertext transfer protocol (HTTP) has become the main protocol to carry out malicious activities. Attackers typically use HTTP for communication with command-and-control servers, click fraud, phishing and other malicious activities, as they can easily hide among the large amount of benign HTTP traffic. The user-agent (UA) field in the HTTP header carries information on the application, operating system (OS), device, and so on, and adversaries fake UA strings as a way to evade detection. Motivated by this, we propose a novel grammar-guided UA string classification method in HTTP flows. We leverage the fact that a number of standard' applications, such as web browsers and iOS mobile apps, have well-defined syntaxes that can be specified using context-free grammars, and we extract OS, device and other relevant information from them. We develop association heuristics to classify UA strings that are generated by non-standard' applications that do not contain OS or device information. We provide a proof-of-concept system that demonstrates how our approach can be used to identify malicious applications that generate fake UA strings to engage in fraudulent activities.-
dc.languageEnglish-
dc.publisherWILEY-BLACKWELL-
dc.titleDetecting malicious activities with user-agent-based profiles-
dc.typeArticle-
dc.identifier.wosid000360842100004-
dc.identifier.scopusid2-s2.0-84941176313-
dc.type.rimsART-
dc.citation.volume25-
dc.citation.issue5-
dc.citation.beginningpage306-
dc.citation.endingpage319-
dc.citation.publicationnameINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT-
dc.identifier.doi10.1002/nem.1900-
dc.contributor.localauthorLee, Sung-Ju-
dc.contributor.nonIdAuthorZhang, Yang-
dc.contributor.nonIdAuthorMekky, Hesham-
dc.contributor.nonIdAuthorZhang, Zhi-Li-
dc.contributor.nonIdAuthorTorres, Ruben-
dc.contributor.nonIdAuthorTongaonkar, Alok-
dc.contributor.nonIdAuthorMellia, Marco-
dc.type.journalArticleArticle-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 5 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0