27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Manoj Cherukuri and Srinivas Mukkamala<br />

Figure 19: Shows customized link visualization where domains exist in the left pane<br />

8. Future work<br />

We are planning to perform similarity analysis among different malicious websites to identify clusters<br />

of malicious sites under one control. This helps in understanding the behavior and the characteristics<br />

of the groups of attackers. We are also planning to extend this study using content analysis of the<br />

malicious webpages.<br />

Acknowledgements<br />

We would like to thank our data sources PhishTank, Malware Domain Blocklist, MalwarePatrol,<br />

Malware Domain List, joewein.de LLC. and abuse.ch.<br />

References<br />

“Beautiful Soup.” (2010), Crummy [Online], 09 Apr, Available: http://www.crummy.com/software/BeautifulSoup<br />

[01 Jun 2010].<br />

Chakrabarti, D. and Faloutsos, C. (2006) “Graph Mining: Laws, Generators and Algorithms”, ACM Computing<br />

Survey, vol. 38, no. 1.<br />

Cheng, J. (2008) "Symantec: Underground Cybercrime Economy Booming.", Ars Technica [Online], 25 Nov,<br />

Available: http://arstechnica.com/security/news/2008/11/symantec-underground-cybercrime-economybooming.ars<br />

[10 Aug 2010].<br />

“Clustering Coefficient.” (2010), Wikipedia Foundation [Online], 29 Jul, Available:<br />

http://en.wikipedia.org/wiki/Clustering_coefficient#Global_clustering_coefficient [07 Aug 2010].<br />

Cova, M., Kruegel, C., and Vigna, G. (2010) “Detection and Analysis of Drive-by Download Attacks and Malicious<br />

JavaScript Code”, WWW 2010 - 19th International World Wide Web <strong>Conference</strong>, North Carolina (USA).<br />

“December 2009 Web Server Survey.” (2009), Netcraft [Online], 24 Dec, Available:<br />

http://news.netcraft.com/archives/2009/12/24/december_2009_web_server_survey.html [10 Aug 2010].<br />

Kalafut, A.J., Shue, C.A. and Gupta, M. (2010) “Malicious Hubs: Detecting Abnormally Malicious Autonomous<br />

Systems”, IEEE Infocom Mini-<strong>Conference</strong>, California (USA).<br />

Luvender, R.V. (2010) “Fraud Trends in 2010: Top threats from a growing underground economy.”, A First Data<br />

White Paper.<br />

Ma, J., Saul, L.K., Savage, S., and Voelker, M.G. (2009) “Beyond Blacklists: Learning to Detect Malicious Web<br />

Sites from Suspicious URLs”, Knowledge Discovery and Data Mining, Paris.<br />

Provos, N. (2010) “Malware Statistics Update.”, Google Online Security Blog [Online], 25 Aug, Available:<br />

http://googleonlinesecurity.blogspot.com/2009/08/malware-statistics-update.html [10 Aug 2010].<br />

Stevens, K. (2010) “The Underground Economy of Pay-Per-Install Business”, Black Hat Technical Security<br />

<strong>Conference</strong>, Las Vegas (USA).<br />

“Top Sites.” (2010), Alexa Internet Inc. [Online], 10 Jul, Available: http://www.alexa.com/topsites [10 Jul 2010].<br />

Watts, D.J. and Strogatz, S.H. (1998), “Collective dynamics of ‘small-world’ networks”, NATURE, Vol 393, pp<br />

440-443.<br />

66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!