Knowing Your Enemy Understanding and Detecting Malicious Web Advertising • Actors in Web Advertising • • • • Publishers Advertisers Audiences Other (ex: trackers) a) Direct Delivery Background b) Ad syndication An example delivery chain of a fake AV campaign. An ad delivered by adsloader.com. An Example • There are three categories of attacks with Malvertising. • Drive-by download : These attacks exploit the vulnerabilities of browsers or plugins using dynamic contents in JavaScript or Flash. • Scam and phishing : These attacks include fake-AVs or others • that attempt to trick users into disclosing sensitive information • Click-fraud : imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad's link Categories of Attacks • Node, Path, and Domain-Path • Malicious Node : A node that performs malicious activities on ad-delivery path is called malicious node. • Malicious Path : we call any path containing • a malicious node a malvertising path. • Infected Publisher : The source node on malvertising path. Terminology • Encountered Malvertising Attacks : 1. 2. 3. Three types of malvertising attacks takes a significant portion of all the attacks detected The average malvertising path length is 8.11 nodes, much longer than the average crawled ad path length of 3.59 nodes The average life time of a particular malicious domain in our data is relatively short, ranging from 1 to 5 days • Properties of Malvertising Nodes : • • • • • Node roles Domain registration URL patterns Node frequency Node-pair frequency Measurement Results • Properties of Malvertising Paths: • The use of ad syndication • Path distances among malicious nodes • Summary of Findings : Malicious nodes tend to stay together, which helps for detection. Measurement Results Mad Tracer Infrastructure Mad Tracer consists of two major components. − The first component identifies malvertising paths by analyzing ad paths and their features. − The second is an analyzer component that intensively monitors the infected publisher pages, so as to study cloaking techniques and to expand our detection results. Mad Tracer Detection Methodology CONCLUSION : Mad Tracer works effectively against real-world malvertising activities: it caught 15 times as many malicious domain paths as Google Safe Browsing and Microsoft Forefront combined, and also discovered several large-scale malvertising campaigns, including a new type of click-fraud attack. A more detailed summary of findings will be released on www.madtracer.org Evaluation Results