Behind the scenes of online attacks: an analysis of exploitation behaviors on the web

Canali, Davide; Balzarotti, Davide
NDSS 2013, 20th Annual Network and Distributed System Security Symposium, February 24-27, 2013, San Diego, CA, United States

Web attacks are nowadays one of the major threats on the Internet, and several studies have analyzed them, providing details on how they are performed and how they spread. However, no study seems to have sufficiently analyzed the typical behavior of an attacker after a website has been compromised. This paper presents the design, implementation, and deployment of a network of 500 fully functional honeypot websites, hosting a range of different services, whose aim is to attract attackers and collect information on what they do during and after their attacks. In 100 days of experiments, our system automatically collected, normalized, and clustered

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

over 85,000 files that were created during approximately 6,000 attacks. Labeling the clusters allowed us to draw a general picture of the attack landscape, identifying the behavior behind each action performed both during and after the exploitation of a web application.

HAL
Type:
Conference
City:
San Diego
Date:
2013-02-24
Department:
Digital Security
Eurecom Ref:
3877
Copyright:
© ISOC. Personal use of this material is permitted. The definitive version of this paper was published in NDSS 2013, 20th Annual Network and Distributed System Security Symposium, February 24-27, 2013, San Diego, CA, United States and is available at :

PERMALINK : https://www.eurecom.fr/publication/3877