The zombies strike back: Towards client-side BeEF detection
Uložené v:
| Názov: | The zombies strike back: Towards client-side BeEF detection |
|---|---|
| Autori: | Chernyshev, Maxim, Hannay, Peter |
| Zdroj: | Research outputs 2014 to 2021 |
| Informácie o vydavateľovi: | Edith Cowan University, Research Online, Perth, Western Australia |
| Rok vydania: | 2014 |
| Zbierka: | Edith Cowan University (ECU, Australia): Research Online |
| Predmety: | Web browser, Google Chrome, JavaScript malware, BeEF, abstract syntax tree fingerprinting, network traffic analysis, Computer Engineering, Information Security |
| Popis: | A web browser is an application that comes bundled with every consumer operating system, including both desktop and mobile platforms. A modern web browser is complex software that has access to system-level features, includes various plugins and requires the availability of an Internet connection. Like any multifaceted software products, web browsers are prone to numerous vulnerabilities. Exploitation of these vulnerabilities can result in destructive consequences ranging from identity theft to network infrastructure damage. BeEF, the Browser Exploitation Framework, allows taking advantage of these vulnerabilities to launch a diverse range of readily available attacks from within the browser context. Existing defensive approaches aimed at hardening network perimeters and detecting common threats based on traffic analysis have not been found successful in the context of BeEF detection. This paper presents a proof-of-concept approach to BeEF detection in its own operating environment – the web browser – based on global context monitoring, abstract syntax tree fingerprinting and real-time network traffic analysis. |
| Druh dokumentu: | text |
| Jazyk: | unknown |
| Relation: | https://ro.ecu.edu.au/ecuworkspost2013/778; http://ro.ecu.edu.au/adf/133/ |
| DOI: | 10.4225/75/57b3de3dfb87a |
| Dostupnosť: | https://ro.ecu.edu.au/ecuworkspost2013/778 https://doi.org/10.4225/75/57b3de3dfb87a http://ro.ecu.edu.au/adf/133/ |
| Rights: | free_to_read |
| Prístupové číslo: | edsbas.3F023DF7 |
| Databáza: | BASE |
| Abstrakt: | A web browser is an application that comes bundled with every consumer operating system, including both desktop and mobile platforms. A modern web browser is complex software that has access to system-level features, includes various plugins and requires the availability of an Internet connection. Like any multifaceted software products, web browsers are prone to numerous vulnerabilities. Exploitation of these vulnerabilities can result in destructive consequences ranging from identity theft to network infrastructure damage. BeEF, the Browser Exploitation Framework, allows taking advantage of these vulnerabilities to launch a diverse range of readily available attacks from within the browser context. Existing defensive approaches aimed at hardening network perimeters and detecting common threats based on traffic analysis have not been found successful in the context of BeEF detection. This paper presents a proof-of-concept approach to BeEF detection in its own operating environment – the web browser – based on global context monitoring, abstract syntax tree fingerprinting and real-time network traffic analysis. |
|---|---|
| DOI: | 10.4225/75/57b3de3dfb87a |
Nájsť tento článok vo Web of Science