All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Malicious File Hash Detection and Drive-by Download Attacks

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F16%3A00087687" target="_blank" >RIV/00216224:14330/16:00087687 - isvavai.cz</a>

  • Result on the web

    <a href="http://link.springer.com/chapter/10.1007/978-81-322-2517-1_63" target="_blank" >http://link.springer.com/chapter/10.1007/978-81-322-2517-1_63</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-81-322-2517-1_63" target="_blank" >10.1007/978-81-322-2517-1_63</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Malicious File Hash Detection and Drive-by Download Attacks

  • Original language description

    Malicious web content has become the essential tool used by cybercriminals to accomplish their attacks on the Internet. In addition, attacks that target web clients, in comparison to infrastructure components, have become prevalent. Malware drive-by downloads are a recent challenge, as their spread appears to be increasing substantially in malware distribution attacks. In this paper we present our methodology for detecting any malicious file downloaded by one of the network hosts. Our detection method is based on a blacklist of malicious file hashes. We process the network traffic, analyze all connections, and calculate MD5, SHA1, and SHA256 hash for each new file seen being transferred over a connection. Then we match the calculated hashes with the blacklist. The blacklist of malicious file hashes is automatically updated each day and the detection is in the real time.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/OFMASUN201301" target="_blank" >OFMASUN201301: CIRC - Mobile dedicated devices to fulfilling ability to respond to cyber incidents</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2016

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the Second International Conference on Computer and Communication Technologies, series Advances in Intelligent Systems and Computing

  • ISBN

    9788132225164

  • ISSN

    2194-5357

  • e-ISSN

  • Number of pages

    9

  • Pages from-to

    661-669

  • Publisher name

    Springer

  • Place of publication

    Hyderabad

  • Event location

    Hyderabad

  • Event date

    Jan 1, 2016

  • Type of event by nationality

    CST - Celostátní akce

  • UT code for WoS article