deseo combating search result poisoning
play

deSEO: Combating Search-Result Poisoning John P John Fang Yu, - PowerPoint PPT Presentation

deSEO: Combating Search-Result Poisoning John P John Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi University of Washington & MSR, Silicon Valley The malware pipeline find vulnerable web servers compromise web servers and


  1. deSEO: Combating Search-Result Poisoning John P John Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi University of Washington & MSR, Silicon Valley

  2. The malware pipeline find vulnerable web servers compromise web servers and host malicious content spread malicious links via email, IM, search results bad stu fg

  3. The malware pipeline find vulnerable web servers • Malware links spread through: compromise web servers and host malicious content • spam emails, spam IMs, social networks, search results, etc. spread malicious links via email, IM, search results • We look at search results bad stu fg

  4. Is this really a problem? • ~40% of popular searches contain at least one malicious link in top results • Scareware fraud made $150 m. in pro fi t last year

  5. Is this really a problem? • ~40% of popular searches contain at least one malicious link in top results • Scareware fraud made $150 m. in pro fi t last year

  6. Contributions • How does the search poisoning attack work? -examined a live attack involving 5,000 compromised sites • What can we learn about such attacks? -identi fi ed common features in search poisoning attacks • How can we defend against them? -developed deSEO, which detected new live SEO attacks on 1,000+ domains

  7. Anatomy of SEO attack search engine compromised redirection Web server server exploit server

  8. Anatomy of SEO attack search engine compromised redirection search Web server query server exploit server

  9. Anatomy of SEO attack search engine compromised redirection search Web server query server exploit server

  10. Anatomy of SEO attack search engine compromised redirection search Web server query server exploit server

  11. Anatomy of SEO attack search engine compromised redirection search Web server query server exploit server

  12. Anatomy of SEO attack search engine compromised redirection search Web server query server exploit server

  13. Analysis of an attack • Examine a speci fi c attack • August - October 2010 • 5,000 compromised domains • Tens of thousands of compromised keywords • Millions of SEO pages generated

  14. How are servers compromised? • Sites running osCommerce • Unpatched vulnerabilities • Allows attackers to host any fi le on the Web server - including executables www.example.com/admin/file_manager.php/login.php? action=processuploads !

  15. What files are uploaded?

  16. What files are uploaded? • php shell to manage fi le operations

  17. What files are uploaded? • php shell to manage fi le operations • HTML templates, images

  18. What files are uploaded? • php shell to manage fi le operations • HTML templates, images • php script to generate SEO web pages

  19. The main php script www.example.com/images/page.php?page=kobayashi+arrested

  20. The main php script www.example.com/images/page.php?page=kobayashi+arrested kobayashi arrested

  21. The main php script www.example.com/images/page.php?page=kobayashi+arrested • Obfuscated script • Simple encryption using nested evals

  22. The main script (de-obfuscated)

  23. The main script (de-obfuscated) Check if search crawler Generate page for keyword

  24. The main script (de-obfuscated) Check if search crawler Generate page for keyword Fetch: snippets from google images from bing

  25. The main script (de-obfuscated) Check if search crawler Generate page for keyword Fetch: snippets from google images from bing Add links to other compromised sites

  26. The main script (de-obfuscated) Check if search crawler Generate page for keyword Fetch: snippets from google images from bing Add links to other compromised sites Cache page

  27. Dense link structure • Other compromised domains found by crawling included links • Each site linked to 200 other sites • ~5,000 compromised domains identi fi ed • Each site hosted 8,000 SEO pages • 40 million pages total

  28. Poisoned keywords • 20,000+ popular search terms poisoned

  29. Poisoned keywords • 20,000+ popular search terms poisoned

  30. Poisoned keywords • 20,000+ popular search terms poisoned

  31. Poisoned keywords • 20,000+ popular search terms poisoned • Google Trends + Bing related searches • haiti earthquake • senate elections • veterans day 2010 • halloween 2010 • thanksgiving 2010 ...

  32. Poisoned keywords • 20,000+ popular search terms poisoned • Google Trends + Bing related searches • haiti earthquake • senate elections • veterans day 2010 • halloween 2010 • thanksgiving 2010 ... • 95% of Google Trends keywords poisoned

  33. Redirection servers • Three domains used for redirection • Over 1,000 exploit URLs fetched *!!!" !"#$%&'()'*+,-#'*+.+/.' δ 2 )!!!" δ 1 δ 3 (!!!" '!!!" &!!!" %!!!" $!!!" τ 0 τ 0 +T τ 1 τ 2 τ 3 #!!!" !" 01/%'

  34. Redirection servers • Three domains used for redirection • Over 1,000 exploit URLs fetched *!!!" !"#$%&'()'*+,-#'*+.+/.' δ 2 )!!!" δ 1 δ 3 (!!!" '!!!" &!!!" %!!!" $!!!" τ 0 τ 0 +T τ 1 τ 2 τ 3 #!!!" !" 01/%' Almost 100,000 victims over 10 weeks

  35. Evasive techniques • Why can’t redirection behavior be easily detected? • Cloaking • Requiring user interaction • Redirection through javascript or fl ash

  36. What are prominent features in search poisoning? • Dense link structure • Automatic generation of relevant pages • Large number of pages with popular keywords • Behavior of compromised sites • before - diverse content and behavior • after - similar content and behavior

  37. What are prominent features in search poisoning? • Dense link structure • Automatic generation of relevant pages • Large number of pages with popular keywords • Behavior of compromised sites • before - diverse content and behavior • after - similar content and behavior

  38. deSEO steps 1. History-based fi ltering select domains where many new pages are set up, di ff erent from older pages 2. Clustering suspicious domains using K-means++ 3. Group similarity analysis select groups where new pages are similar across domains

  39. Sample web URLs with trendy keywords http://www.askania-fachmaerkte.de/images/news.php? page=justin+bieber+breaks+neck

  40. Sample web URLs with trendy keywords History based detection

  41. Sample web URLs with trendy keywords History based detection Domain clustering - lexical features of URLs String features- keyword separators, arguments, fi lename, path Numerical features- number of arguments, length of arguments, length of keywords Bag of words- set of keywords

  42. Sample web URLs with trendy keywords History based detection Domain clustering - lexical features of URLs Group analysis - web page feature similarity

  43. Sample web URLs with trendy keywords History based detection Domain clustering - lexical features of URLs Group analysis - web page feature similarity

  44. !"# !"!+ !"#$%&'()'*)+#,-.)) Sample web URLs with !"!* !"!) trendy keywords !"!( !"!' !"!& !"!% History based detection !"!$ !"!# ! #! %! '! )! +! ##! #%! #'! #)! #+! $#! $%! $'! $)! %!! %(! &!! &$! '#! ()! /)'*)012.) Domain clustering - lexical features of URLs !"* Group analysis !") !"#$%&'()'*)+#,-.)) - web page feature similarity !"( !"' !"& !"% !"$ !"# ! ! # $ ) + #! $! $+ %$ %* (! (' (( ### #+# /)'*)012.)

  45. Sample web URLs with trendy keywords History based detection Domain clustering - lexical features of URLs Group analysis - web page feature similarity Regular expressions .*\/xmlrpc\.php\/\?showc=\w+(\+\w+)+$ - to match URLs not in our sample

  46. deSEO findings • 11 malicious groups from sampled web graph in January 2011 • 957 domains • 15,482 URLs • Revealed a new search poisoning attack • compromised Wordpress installations • cloaking to avoid detection • di ff erent link topology

  47. Applying to search results • 120 keyword searches in Google and Bing • 163 malicious URLs detected in results • 43 search terms a ff ected 3<* !"#$%&''()'#*+,-,(".'+,/0.' :* 8* 4* 5* <* 3* 5* 6* 4* 7* 8* 9* :* ;* 1%*&-2'&%."+3'4*5%'

  48. Conclusion • Malware and SEO are big problems • Analyzed an ongoing scareware campaign • Identi fi ed thousands of compromised domains • Identi fi ed prominent features in SEO attacks and used them to build deSEO • Promising results on a partial dataset from bing • Identi fi ed multiple live SEO attacks

  49. Thank You jjohn@cs.washington.edu

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend