12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010 153<strong>in</strong>fection could have caused millions <strong>of</strong> dollars <strong>of</strong> damageand caused irreparable harm to hundreds <strong>of</strong> thousands <strong>of</strong>users through identity and asset theft. [3]But <strong>Web</strong> threats don’t just steal confidential<strong>in</strong>formation; they can also steal network resources.Variations <strong>of</strong> e-greet<strong>in</strong>g card spam were sent throughout2007. These simple spam messages told recipients that afriend had sent them an e-greet<strong>in</strong>g card and to follow thel<strong>in</strong>k <strong>in</strong> the email to view the card. If recipients followedthe l<strong>in</strong>k, it took them to a <strong>Web</strong> site that downloadedmalicious code.This code hijacked the computer, turn<strong>in</strong>g it <strong>in</strong>to a “bot”and allow<strong>in</strong>g the hackers to use the mach<strong>in</strong>e for their ownpurposes—send<strong>in</strong>g spam, host<strong>in</strong>g malicious <strong>Web</strong> sites,and much more. Consumer and corporate computers were<strong>in</strong>fected by the millions. Hackers network these <strong>in</strong>fectedcomputers to create botnets, steal<strong>in</strong>g resources and furtherperpetuat<strong>in</strong>g their fraudulent activities.II. WEB THREATS DEFINED<strong>Web</strong> threats are any threat that uses the <strong>Web</strong> t<strong>of</strong>acilitate cyber crime. They are sophisticated <strong>in</strong> theirmethods, us<strong>in</strong>g multiple types <strong>of</strong> malware and fraud, all <strong>of</strong>which utilize HTTP or HTTPS protocols, but can alsoemploy other protocols as components <strong>of</strong> the attack, suchas l<strong>in</strong>ks <strong>in</strong> email or IM, or malware <strong>in</strong> attachments or onservers that access the <strong>Web</strong>. The creators <strong>of</strong> such threatsfrequently update <strong>Web</strong> site content, variants, and malwaretypes <strong>in</strong> order to evade detection and achieve greatersuccess.<strong>Web</strong> threats based on malware are hidden with<strong>in</strong> <strong>Web</strong>pages and victims are <strong>in</strong>fected when they visit the page.Fraudulent sites mimic legitimate bus<strong>in</strong>ess <strong>Web</strong> sites anduse social eng<strong>in</strong>eer<strong>in</strong>g to request visitors to discloseconfidential <strong>in</strong>formation. Individuals once characterizedas hackers, virus writers, spammers, and spy ware makersare now simply known as cyber crim<strong>in</strong>als with f<strong>in</strong>ancialpr<strong>of</strong>it their primary aim.Over the last 15 years, <strong>in</strong>formation security threatshave evolved through a series <strong>of</strong> <strong>in</strong>carnations. In eachcase, malware writers and fraudsters sought out themedium that was most used and least protected (forexample email). Today, a new wave <strong>of</strong> threats is emerg<strong>in</strong>gthat uses the <strong>Web</strong> as a delivery vehicle. These <strong>Web</strong> threatsare ga<strong>in</strong><strong>in</strong>g traction at a time when the <strong>Web</strong> has become amajor commerce eng<strong>in</strong>e as well as social network<strong>in</strong>gvehicle, with usage cont<strong>in</strong>u<strong>in</strong>g to grow.At the same time, the <strong>Web</strong> is relatively unprotected,compared to messag<strong>in</strong>g for example, as a medium todeliver malware and conduct fraud. Accord<strong>in</strong>g to IDC,“Up to 30% <strong>of</strong> companies with 500 or more staff havebeen <strong>in</strong>fected as a result <strong>of</strong> Internet surf<strong>in</strong>g, while only20%-25% <strong>of</strong> the same companies experienced viruses andworms from emails.” [4]III. WEB THREAT DELIVERY MECHANISMS<strong>Web</strong> threats can be divided <strong>in</strong>to two primarycategories, based on delivery method – push and pull.Push based threats use spam, phish<strong>in</strong>g, or other fraudulentmeans to lure a user to a malicious (<strong>of</strong>ten spo<strong>of</strong>ed) <strong>Web</strong>site, which then collects <strong>in</strong>formation and/or <strong>in</strong>jectsmalware. Push attacks use phish<strong>in</strong>g, DNS poison<strong>in</strong>g (orpharm<strong>in</strong>g), and other means to appear to orig<strong>in</strong>ate from atrusted source. Their creators have researched their targetwell enough to spo<strong>of</strong> corporate logos, <strong>of</strong>ficial <strong>Web</strong> sitecopy, and other conv<strong>in</strong>c<strong>in</strong>g evidence to <strong>in</strong>crease theappearance <strong>of</strong> authenticity. Precisely-targeted push-basedthreats are <strong>of</strong>ten called “spear phish<strong>in</strong>g” to reflect thefocus <strong>of</strong> their data gather<strong>in</strong>g (“phish<strong>in</strong>g”) attack.Spear phish<strong>in</strong>g typically targets specific <strong>in</strong>dividualsand groups for f<strong>in</strong>ancial ga<strong>in</strong>. In November 2006, amedical center fell victim to a spear phish<strong>in</strong>g attack.Employees <strong>of</strong> the medical center received an email tell<strong>in</strong>gthem they had been laid <strong>of</strong>f. The email also conta<strong>in</strong>ed al<strong>in</strong>k that claimed to take the recipient to a careercounsel<strong>in</strong>g site. Recipients that followed the l<strong>in</strong>k were<strong>in</strong>fected by a keylogg<strong>in</strong>g Trojan. [5] In other push-basedthreats, malware authors use social eng<strong>in</strong>eer<strong>in</strong>g such asentic<strong>in</strong>g email subject l<strong>in</strong>es that reference holidays,popular personalities, sports, pornography, world events,and other popular topics to persuade recipients to open theemail and follow l<strong>in</strong>ks to malicious sites or openattachments with malware that accesses the <strong>Web</strong>.Pull-based threats are <strong>of</strong>ten referred to as “drive-by”threats, s<strong>in</strong>ce they can affect any visitor, regardless <strong>of</strong>precautions. Pull threat developers <strong>in</strong>fect legitimate <strong>Web</strong>sites, which unknow<strong>in</strong>gly transmit malware to visitors oralter search results to take users to malicious sites. Uponload<strong>in</strong>g the page, the user’s browser passively runs amalware downloader <strong>in</strong> a hidden HTML frame (IFRAME)without any user <strong>in</strong>teraction. Both push- and pull-based<strong>Web</strong> threat variants target <strong>in</strong>fection at a regional or locallevel (for example, via local language sites aimed atparticular demographics), rather than us<strong>in</strong>g the mass<strong>in</strong>fection technique <strong>of</strong> many earlier malware approaches.These threats typically take advantage <strong>of</strong> Internet port 80,which is almost always open to permit access to the<strong>in</strong>formation, communication, and productivity that the<strong>Web</strong> affords to employees.IV. TODAY’S INSIDER - THREAT IS STEALTH MALWARELaw enforcement, computer crime experts, and eventhe military are play<strong>in</strong>g catch up to the threat posed toconsumers, bus<strong>in</strong>esses, and national security as cybercrim<strong>in</strong>als cash <strong>in</strong> on stolen identity data, fraudulent onl<strong>in</strong>etransactions, and cyber espionage. It is no surprise that therise <strong>in</strong> cyber crime has co<strong>in</strong>cided with the <strong>in</strong>creased use <strong>of</strong>the Internet and especially “<strong>Web</strong> 2.0” technologies.<strong>Web</strong> sites and applications now support usercontributedcontent, syndicated content, iframes, thirdpartywidgets (or applets), and convoluted advertis<strong>in</strong>gdistribution networks <strong>in</strong>to which ‘stealth’ malware caneasily be <strong>in</strong>jected somewhere along the l<strong>in</strong>e. In a 2007USENIX paper, Google researchers determ<strong>in</strong>ed thatapproximately 9% <strong>of</strong> all suspicious web sites launched“drive-by” downloads <strong>of</strong> stealth malware b<strong>in</strong>aries[12].Government studies[13] estimate that 65% <strong>of</strong> all exploits© 2010 ACADEMY PUBLISHER

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!