Abstract
VirusTotal (VT) is a widely used scanning service for researchers and practitioners to label malicious entities and predict new security threats. Unfortunately, it is little known to the end-users how VT URL scanners decide on the maliciousness of entities and the attack types they are involved in (e.g., phishing or malware-hosting websites). In this paper, we conduct a systematic comparative study on VT URL scanners' behavior for different attack types of malicious URLs, in terms of 1) detection specialties, 2) stability, 3) correlations between scanners, and 4) lead/lag behaviors. Our findings highlight that the VT scanners commonly disagree with each other on their detection and attack type classification, leading to challenges in ascertaining the maliciousness of a URL and taking prompt mitigation actions according to different attack types. This motivates us to present a new highly accurate classifier that helps correctly identify the attack types of malicious URLs at the early stage. This in turn assists practitioners in performing better threat aggregation and choosing proper mitigation actions for different attack types.
| Original language | English |
|---|---|
| Pages (from-to) | 55-56 |
| Number of pages | 2 |
| Journal | Performance Evaluation Review |
| Volume | 52 |
| Issue number | 1 |
| DOIs | |
| Publication status | Published - 10 Jun 2024 |
| Event | 2024 ACM SIGMETRICS/IFIP Performance Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/PERFORMANCE 2024 - Venice, Italy Duration: 10 Jun 2024 → 14 Jun 2024 |
Keywords
- attack type classifier
- malicious urls
- virustotal measurement