TrueClick: automatically distinguishing trick banners from genuine download links

Sevtap Duman, Kaan Onarlioglu, Ali O. Ulusoy, William K. Robertson, E. Kirda
{"title":"TrueClick: automatically distinguishing trick banners from genuine download links","authors":"Sevtap Duman, Kaan Onarlioglu, Ali O. Ulusoy, William K. Robertson, E. Kirda","doi":"10.1145/2664243.2664279","DOIUrl":null,"url":null,"abstract":"The ubiquity of Internet advertising has made it a popular target for attackers. One well-known instance of these attacks is the widespread use of trick banners that use social engineering techniques to lure victims into clicking on deceptive fake links, potentially leading to a malicious domain or malware. A recent and pervasive trend by attackers is to imitate the \"download\" or \"play\" buttons in popular file sharing sites (e.g., one-click hosters, video-streaming sites, bittorrent sites) in an attempt to trick users into clicking on these fake banners instead of the genuine link. In this paper, we explore the problem of automatically assisting Internet users in detecting malicious trick banners and helping them identify the correct link. We present a set of features to characterize trick banners based on their visual properties such as image size, color, placement on the enclosing webpage, whether they contain animation effects, and whether they consistently appear with the same visual properties on consecutive loads of the same webpage. We have implemented a tool called TrueClick, which uses image processing and machine learning techniques to build a classifier based on these features to automatically detect the trick banners on a webpage. Our approach automatically classifies trick banners, and requires no manual effort to compile blacklists as current approaches do. Our experiments show that TrueClick results in a 3.55 factor improvement in correct link selection in the absence of other ad blocking software, and that it can detect trick banners missed by a popular ad detection tool, Adblock Plus.","PeriodicalId":104443,"journal":{"name":"Proceedings of the 30th Annual Computer Security Applications Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 30th Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2664243.2664279","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

Abstract

The ubiquity of Internet advertising has made it a popular target for attackers. One well-known instance of these attacks is the widespread use of trick banners that use social engineering techniques to lure victims into clicking on deceptive fake links, potentially leading to a malicious domain or malware. A recent and pervasive trend by attackers is to imitate the "download" or "play" buttons in popular file sharing sites (e.g., one-click hosters, video-streaming sites, bittorrent sites) in an attempt to trick users into clicking on these fake banners instead of the genuine link. In this paper, we explore the problem of automatically assisting Internet users in detecting malicious trick banners and helping them identify the correct link. We present a set of features to characterize trick banners based on their visual properties such as image size, color, placement on the enclosing webpage, whether they contain animation effects, and whether they consistently appear with the same visual properties on consecutive loads of the same webpage. We have implemented a tool called TrueClick, which uses image processing and machine learning techniques to build a classifier based on these features to automatically detect the trick banners on a webpage. Our approach automatically classifies trick banners, and requires no manual effort to compile blacklists as current approaches do. Our experiments show that TrueClick results in a 3.55 factor improvement in correct link selection in the absence of other ad blocking software, and that it can detect trick banners missed by a popular ad detection tool, Adblock Plus.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
TrueClick:自动区分欺骗横幅从真正的下载链接
无处不在的互联网广告使其成为攻击者的热门目标。这些攻击的一个众所周知的例子是广泛使用欺骗横幅,使用社会工程技术引诱受害者点击欺骗性虚假链接,可能导致恶意域名或恶意软件。攻击者最近的一个普遍趋势是模仿流行的文件共享网站(例如,一键式主机,视频流网站,bt网站)中的“下载”或“播放”按钮,试图欺骗用户点击这些虚假的横幅而不是真正的链接。在本文中,我们探讨了自动协助互联网用户检测恶意欺骗横幅并帮助他们识别正确链接的问题。我们提出了一组基于其视觉属性的特征,如图像大小,颜色,在包围网页上的位置,是否包含动画效果,以及它们是否始终以相同的视觉属性出现在同一网页的连续加载上。我们已经实现了一个名为TrueClick的工具,它使用图像处理和机器学习技术来构建基于这些特征的分类器,以自动检测网页上的欺骗横幅。我们的方法会自动对欺骗广告条进行分类,不需要像目前的方法那样手动编制黑名单。我们的实验表明,在没有其他广告拦截软件的情况下,TrueClick在正确链接选择方面的效果提高了3.55倍,而且它可以检测到流行的广告检测工具Adblock Plus遗漏的欺骗性横幅。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking Relation extraction for inferring access control rules from natural language artifacts A security evaluation of AIS automated identification system Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system Exploring and mitigating privacy threats of HTML5 geolocation API
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1