Loading [a11y]/accessibility-menu.js
Drive-By Download Attacks: A Comparative Study | IEEE Journals & Magazine | IEEE Xplore

Drive-By Download Attacks: A Comparative Study


Abstract:

Malware authors are exploiting browsers in a stealthy manner to distribute infectious code on the Internet. Drive-by download attacks are a prominent attack method in sup...Show More

Abstract:

Malware authors are exploiting browsers in a stealthy manner to distribute infectious code on the Internet. Drive-by download attacks are a prominent attack method in support of this cause. During such attacks, well-designed automated applications called browser exploit packs (BEPs) are deployed on infected servers. The authors' feature-oriented study analyzes the built-in features provided by BEPs used in the successful execution of drive-by downloads.
Published in: IT Professional ( Volume: 18, Issue: 5, Sept.-Oct. 2016)
Page(s): 18 - 25
Date of Publication: 28 September 2016

ISSN Information:


Contact IEEE to Subscribe

References

References is not available for this document.