Abstract

AbstractBecause of the evolution of cloud computing techniques, web browsing becomes the main function for persons using computers. Researchers are then devoted to the study of the attack characteristics for delaminating the attacks via Web connections. Because these defense technologies on the server side have great progress, attackers therefore target to the other side, the client side of personal computers. Drive‐by download is the most commonly used method to attack client computers, which exploits software vulnerabilities on the computers to secretly download and install malware. That is used to collect information on the affected computers or take those as hops to the next victims. Because of the protection technology improved and user awareness educated, attackers developed a new variety type of attacks named ‘drive‐by cache’ that has different attack steps and counterfeit file extension from the original ‘drive‐by download’. The changes elude those existed detection methods. This paper proposed a depth defense scheme to detect and prevent this type of attacks via collaboratively many existing solutions in phases. Copyright © 2014 John Wiley & Sons, Ltd.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.