Malicious File Hash Detection and Drive-by Download Attacks
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F16%3A00087687" target="_blank" >RIV/00216224:14330/16:00087687 - isvavai.cz</a>
Result on the web
<a href="http://link.springer.com/chapter/10.1007/978-81-322-2517-1_63" target="_blank" >http://link.springer.com/chapter/10.1007/978-81-322-2517-1_63</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/978-81-322-2517-1_63" target="_blank" >10.1007/978-81-322-2517-1_63</a>
Alternative languages
Result language
angličtina
Original language name
Malicious File Hash Detection and Drive-by Download Attacks
Original language description
Malicious web content has become the essential tool used by cybercriminals to accomplish their attacks on the Internet. In addition, attacks that target web clients, in comparison to infrastructure components, have become prevalent. Malware drive-by downloads are a recent challenge, as their spread appears to be increasing substantially in malware distribution attacks. In this paper we present our methodology for detecting any malicious file downloaded by one of the network hosts. Our detection method is based on a blacklist of malicious file hashes. We process the network traffic, analyze all connections, and calculate MD5, SHA1, and SHA256 hash for each new file seen being transferred over a connection. Then we match the calculated hashes with the blacklist. The blacklist of malicious file hashes is automatically updated each day and the detection is in the real time.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
IN - Informatics
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/OFMASUN201301" target="_blank" >OFMASUN201301: CIRC - Mobile dedicated devices to fulfilling ability to respond to cyber incidents</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2016
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of the Second International Conference on Computer and Communication Technologies, series Advances in Intelligent Systems and Computing
ISBN
9788132225164
ISSN
2194-5357
e-ISSN
—
Number of pages
9
Pages from-to
661-669
Publisher name
Springer
Place of publication
Hyderabad
Event location
Hyderabad
Event date
Jan 1, 2016
Type of event by nationality
CST - Celostátní akce
UT code for WoS article
—