27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Manoj Cherukuri and Srinivas Mukkamala<br />

This website in Figure 13 is not malicious but has links to other malicious websites on the right column<br />

(marked in box) with the heading as “TRY MORE”. Similarity among the products on the right column<br />

with the product of the main website draws the user’s attention towards them.<br />

5.3 Malicious websites linked to other malicious websites<br />

For this analysis, a graph G (V, E) was constructed, where V is the set of vertices and E is the set of<br />

edges. All the malicious websites that participated in the construction of the link structure were<br />

considered as the vertices of graph G. Based on the links obtained during the construction of the link<br />

structure, the vertices were connected with directional edges. In order to identify the malicious<br />

websites linked to other malicious websites, all the vertices which had links to another vertex were<br />

selected.<br />

Figure 13: Figure shows the screenshot of cddvdcopy.net<br />

In our study of link analysis, it was observed that around 1000 malicious websites were linked directly<br />

to another malicious website. Manual analysis was done on these sites to have a better knowledge<br />

about the linking mechanism. The reason for having such links might be that many malicious domains<br />

are under the control of a single envelope stealer trying to host multiple types of attacks on different<br />

domains. In such a case the envelope stealers would prefer to have links among the malicious<br />

domains under their control. The domains encountered under this category were less compared to the<br />

previous category. The main reason might be the restriction for the traffic sellers from the envelope<br />

stealers as the victims become common among the different envelope stealers. However, to come to<br />

a conclusion on this point, a detailed analysis on the coding style and the type of attack used needs to<br />

be figured out which is out of scope for this study. Figures 14, 15 and 16 show screenshots of the<br />

examples of malicious websites under this category.<br />

62

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!