Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites

Takeshi YAGI
Hiroyuki OHSAKI
Masayuki MURATA

IEICE TRANSACTIONS on Communications   Vol.E97-B    No.1    pp.76-86
Publication Date: 2014/01/01
Online ISSN: 1745-1345
DOI: 10.1587/transcom.E97.B.76
Print ISSN: 0916-8516
Type of Manuscript: PAPER
Category: Internet
malware,  website,  blacklist,  monitoring,  state transition,  analysis,  

Full Text: PDF>>
Buy this Article

We proposes a method for determining the frequency for monitoring the activities of a malware download site used for malware attacks on websites. In recent years, there has been an increase in attacks exploiting vulnerabilities in web applications for infecting websites with malware and maliciously using those websites as attack platforms. One scheme for countering such attacks is to blacklist malware download sites and filter out access to them from user websites. However, a malware download site is often constructed through the use of an ordinary website that has been maliciously manipulated by an attacker. Once the malware has been deleted from the malware download site, this scheme must be able to unblacklist that site to prevent normal user websites from being falsely detected as malware download sites. However, if a malware download site is frequently monitored for the presence of malware, the attacker may sense this monitoring and relocate that malware on a different site. This means that an attack will not be detected until the newly generated malware download site is discovered. In response to these problems, we clarify the change in attack-detection accuracy caused by attacker behavior. This is done by modeling attacker behavior, specifying a state-transition model with respect to the blacklisting of a malware download site, and analyzing these models with synthetically generated attack patterns and measured attack patterns in an operation network. From this analysis, we derive the optimal monitoring frequency that maximizes the true detection rate while minimizing the false detection rate.