论文标题

关于网络钓鱼和恶意软件URL的Virustotal报告的大规模研究和分类

A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs

论文作者

Choo, Euijin, Nabeel, Mohamed, De Silva, Ravindu, Yu, Ting, Khalil, Issa

论文摘要

Virustotal(VT)为包括URL,IP地址和二进制文件在内的各种实体提供了汇总的威胁情报。研究人员和从业人员广泛使用它来收集地面真理并评估实体的恶意性。在这项工作中,我们对VT URL扫描报告进行了全面分析,其中包含两年内95个扫描仪的15.77亿个URL的结果。就其检测和攻击类型分类而言,已知各个VT扫描仪嘈杂。为了获得URL的高质量基础真理,并积极采取适当的措施来减轻不同类型的攻击,有两个挑战:(1)如何确定给定的URL在给定嘈杂报告的情况下是否是恶意的,以及(2)如何确定攻击类型(例如,网络钓鱼或恶意软件托管),涉及来自不同扫描仪的相互矛盾的攻击标签。在这项工作中,我们提供了有关VT扫描仪在不同攻击类型URL的行为的系统比较研究。决定恶意性的一种常见做法是使用将URL报告为恶意的扫描仪的截止阈值。但是,在这项工作中,我们表明,由于几个原因,使用固定阈值是次优的:(1)扫描仪之间的相关性; (2)铅/滞后行为; (3) the specialty of scanners; (4)扫描仪的质量和可靠性。确定攻击类型的一种常见做法是使用多数投票。但是,我们表明,由于相关扫描仪的偏见,大多数投票无法准确地对URL的攻击类型进行分类。相反,我们提出了一种基于机器学习的方法,以给定VT报告为URL分配攻击类型。

VirusTotal (VT) provides aggregated threat intelligence on various entities including URLs, IP addresses, and binaries. It is widely used by researchers and practitioners to collect ground truth and evaluate the maliciousness of entities. In this work, we provide a comprehensive analysis of VT URL scanning reports containing the results of 95 scanners for 1.577 Billion URLs over two years. Individual VT scanners are known to be noisy in terms of their detection and attack type classification. To obtain high quality ground truth of URLs and actively take proper actions to mitigate different types of attacks, there are two challenges: (1) how to decide whether a given URL is malicious given noisy reports and (2) how to determine attack types (e.g., phishing or malware hosting) that the URL is involved in, given conflicting attack labels from different scanners. In this work, we provide a systematic comparative study on the behavior of VT scanners for different attack types of URLs. A common practice to decide the maliciousness is to use a cut-off threshold of scanners that report the URL as malicious. However, in this work, we show that using a fixed threshold is suboptimal, due to several reasons: (1) correlations between scanners; (2) lead/lag behavior; (3) the specialty of scanners; (4) the quality and reliability of scanners. A common practice to determine an attack type is to use majority voting. However, we show that majority voting could not accurately classify the attack type of a URL due to the bias from correlated scanners. Instead, we propose a machine learning-based approach to assign an attack type to URLs given the VT reports.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源