StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising - Research Paper Example

Cite this document
Summary
(2012), in their study titled Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising, have talked about the malicious effect of infected advertisements, known as malware, and how people and even renowned business websites fall prey to such malware…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising
Read Text Preview

Extract of sample "Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising"

Summary of a Study Li et al. , in their study d Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising, have talked about the malicious effect of infected advertisements, known as malware, and how people and even renowned business websites fall prey to such malware. They have talked about how common this malware has become in present days, and how easily it can get access to personal data and misuse it. The researchers have also presented an effective technique, in the form of a new detection system, called MadTracer, which enables the users to detect the malware and secure their data from it through identifying threats and attacks.

They have found MadTracer to be very effective as compared to renowned malware detecting softwares, and have discussed its efficiency in detail. In the study, three types of malware attacks were considered: Drive-by download, scam and phishing, and click-fraud attacks. The study was conducted by focusing on ad-related infrastructure; that is, the relationship and interaction between different ad-related parties and ad publishing parties was analyzed. The pattern of interaction was evaluated by crawling through different popular web pages and publisher parties, so as to identify how malware could be detected through identifying malware.

A crawler as a Firefox add-on was created to help trace the web pages. All network requests, responses, browser events, and the retrieved code was recorded. After that, the causal relations among the set of HTTP requests (URLs) originated from the pages were identified. Nodes, paths, and domain paths were studied. The malicious activities and their infrastructure features were studied in detail to identify the malicious activities that exploit the display ads. The findings of the study show that malicious ad nodes could be differentiated from the legitimate ones through studying common node features, like node roles and domain registration times.

However, these features were to be analyzed together and not alone to maximize the differentiating power. Node features, when studied with ad paths, provided greatest detection. Multiple consecutive malicious nodes, that were totally unrelated with ads, were found to be staying together along the redirection chain of a normal ad, which helped identify that it was easy to detect malware through neighboring nodes. It was not required to go beyond neighboring nodes for detection. Hence, the interaction between nodes was very helpful in identifying malicious attacks set for exploiting display ads.

My personal opinion is that the researchers have made great effort in detecting the malware and the malicious activities that are set to exploit the display ads. It is very important to stop this malware, because manifold business websites, e-consumers, and e-businessmen get affected by such malicious activities, unknowingly. Computer experts might be able to detect such malware, but laymen easily fall prey to malvertising ads and websites. So, it is very important to create ways for them to identify the malware, so that they stay safe while indulging in e-commerce and other activities on the internet.

The relationship among nodes and the patterns of interaction among neighboring nodes was very interesting, and I found this study to be a beneficial addition in malware detection studies. ReferencesLi, Z., Zhang, K., Xie, Y., Yu, F., & Wang, X. (2012). Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising. Retrieved November 18, 2012, from http://www.cs.indiana.edu/~lizho/fp029-li.pdf

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Knowing Your Enemy: Understanding and Detecting Malicious Web Research Paper”, n.d.)
Knowing Your Enemy: Understanding and Detecting Malicious Web Research Paper. Retrieved from https://studentshare.org/information-technology/1608729-knowing-your-enemy-understanding-and-detecting-malicious-web-advertising
(Knowing Your Enemy: Understanding and Detecting Malicious Web Research Paper)
Knowing Your Enemy: Understanding and Detecting Malicious Web Research Paper. https://studentshare.org/information-technology/1608729-knowing-your-enemy-understanding-and-detecting-malicious-web-advertising.
“Knowing Your Enemy: Understanding and Detecting Malicious Web Research Paper”, n.d. https://studentshare.org/information-technology/1608729-knowing-your-enemy-understanding-and-detecting-malicious-web-advertising.
  • Cited: 0 times

CHECK THESE SAMPLES OF Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising

Web Security and Factors Contributing to Web Security

The paper discusses web security and factors contributing to web security in terms of user's knowledge, technology, and necessary tools for security.... Additionally, the paper touches on the web history, user's responsibility, internet controls, and development of SWEET… The paper discusses web security and factors contributing to web security in terms of user's knowledge, technology, and necessary tools for security....
14 Pages (3500 words) Essay

Understanding advertising media

Even though the Internet has been exponentially becoming more popular since the start of the 90's there is evidence that it is not a successful advertising medium.... … Even though the Internet has been exponentially becoming more popular since the start of the 90's there is evidence that it is not a successful advertising medium.... he paper is divided in three sections: firstly there is given some information on the Internet and its history since its spreading as a commodity, second examples of advertising techniques through examples are scrutinized, and finally the reasons that advertising through the Internet is not working are given....
4 Pages (1000 words) Essay

MARKETING RESEARCH AND INFORMATION

It serves approximately 47 million customers everyday (McDonalds 2008).... The firm mainly sells burgers both chicken and beef, hamburgers, French fries, shakes, desserts, soft drinks and kids meals etc.... since… For children almost all the outlets have play areas where children spend hours....
24 Pages (6000 words) Essay

Intrusion Detection Systems

“Protecting web Server from DDOS Attack” In Proceeding of WWW10 Conference, ACM, Hong Kong, 2001.... For Inline transmission, the IDS does not transmit signals to the owner rather it auto responds to the malicious activity by reconstructing the connection to block communication from the suspicious source.... Question three Thresholds are used with IDS alerts because they add an extra advantage to the IDS in detecting any intrusion by identifying an attack in a short duration....
2 Pages (500 words) Essay

Potential Malicious Attacks in ACME Inc

In the essay “Potential malicious Attacks in ACME Inc.... rdquo; the author discusses malicious attacks, which occur when wireless LAN technology is employed in the system network without proper data protection and/or authentication between access points and clients.... hellip; The author states that when a malicious code attack happens, the main target on restoring operations as quickly as attainable sometimes overrides the will to gather knowledge on the direct prices to respond, the loss of productivity, or different kinds of impact that a malicious code attack has on a company....
4 Pages (1000 words) Assignment

Malicious softwares

In the paper “malicious softwares” the author analyzes various classes of malware programs, along with their effects to the computer system and system users.... A virus is a malware program that has the ability to propagate itself into more copies and end up being a part of another program in the computer....
11 Pages (2750 words) Essay

The Convergence of Knowing and Understanding

The essay "The Convergence of Knowing and understanding" presents a discussion of the claim that we see and understand things not as they are but as we are.... he four different ways of knowing are perception, emotion, language and reason.... nbsp;It is a known fact that knowledge comes from an interface amidst human brains and the exterior world....
6 Pages (1500 words) Essay

Mitigating the Threat of Malicious Insiders

The following paper "Mitigating the Threat of malicious Insiders" aims at discussing the numerous ways of mitigating the threat of malicious insiders.... This especially applies to the problem of the malicious insider.... Businesses that seek to operate effectively must understand and develop ways to mitigate the threat of malicious insiders.... nbsp; The word malicious insider stems from the word insider.... Furthermore, Walker (2008), argues that a malicious insider can be defined in both technical and legal terms....
5 Pages (1250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us