27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Manoj Cherukuri and Srinivas Mukkamala<br />

Figure 16: Screenshot of the website medicalmarijuanablog.com<br />

6. Link visualization<br />

Links were visualized on the Google maps using the Google maps application programming interface<br />

(API). The pre-computed geographic locations of the websites using the IP address to location<br />

database were used to plot them on to the Google maps. Link visualization provides an interactive<br />

means for analyzing the patterns followed by the links among different websites. The interactive map<br />

helps in zooming and displays the name of the website on clicking the marker.<br />

In Figure 17, the malicious websites and the facilitating websites are marked with red and blue<br />

markers respectively. The red lines represent the bidirectional links, the green lines represent the<br />

incoming link with respect to the facilitating website and the blue lines represent the outgoing link with<br />

respect to the facilitating website. The lines going out from one extreme are connected through the<br />

other extreme. From the above two images it is evident that the links are traversing among the<br />

malicious domains across different countries presenting the fact that the attackers are not limiting the<br />

hosting of their malicious websites either to a hosting service or to a country.<br />

In Figure 18, the red lines represent the bi-directional links and the green lines represent the<br />

unidirectional links. In Figure 19, on selecting a domain all the links associated with malicious<br />

domains are depicted on the map. The green line represents an incoming link with respect to the<br />

selected domain, the red line represents a bidirectional link and the blue line represents the outgoing<br />

link with respect to the selected domain.<br />

7. Conclusion<br />

In this work we presented some interesting heuristics of the malicious websites that help in enhancing<br />

the mechanisms used for the detection of malicious websites.<br />

We identified the behavior of the malicious websites with respect to their indegrees and outdegrees.<br />

We defined an equation that fits to the behavior of the indegree and the outdegree of the malicious<br />

websites, which followed the power law with exponential cutoff.<br />

Compared the outdegree of the malicious websites with that of the legitimate websites and concluded<br />

that the malicious websites tend to have low outdegree compared to the legitimate websites.<br />

We computed the clustering coefficient of the malicious websites and compared to that of the<br />

legitimate websites and showed that the linking among the malicious websites is low compared to that<br />

of the legitimate websites.<br />

Our results during the analysis showed that the attackers are using legitimate websites with high<br />

Google page rank as the means for directing traffic towards the malicious websites.<br />

64

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!