このエントリーをはてなブックマークに追加
ID 67688
FullText URL
fulltext.pdf 1.53 MB
Author
Yamauchi, Toshihiro Faculty of Environmental, Life, Natural Science and Technology, Okayama University ORCID Kaken ID publons researchmap
Orito, Rintaro Graduate School of Natural Science and Technology, Okayama University
Ebisu, Koji Graduate School of Natural Science and Technology, Okayama University
Sato, Masaya Faculty of Computer Science and Systems Engineering, Okayama Prefectural University
Abstract
Website clicks that redirect Android-phone users to malicious websites with fake virus alerts or phishing attacks are increasing exponentially. Although a uniform resource locator (URL) blocklist is considered a suitable countermeasure to such attacks, it is difficult to efficiently identify malicious websites. To the best of our knowledge, no research has focused on detecting attacks that redirect Android-phone users to malicious websites. Therefore, we propose a redirect-detection method that focuses on the URL bar-switching interval of Android-based Google Chrome browser. The proposed method, which can be easily installed as an Android application, uses the Android accessibility service to detect unintended redirects to malicious websites without collecting information about these websites in advance. This paper details the design, implementation, and evaluation results of the proposed application on an actual Android device. We determined the threshold values for the number of times the URL bar switches and the elapsed time to determine redirects to malicious websites for the proposed method. Based on the results, we investigated the causes of false-positive detection of redirects to benign websites and offer solutions on handling them. We also present the threshold values that can minimize the false positive and negative rates, as well as the detection accuracy of the proposed method based on these threshold values. Additionally, we present the evaluations results based on the access logs of actual users participating in the WarpDrive project experiment, which indicate that the proposed method minimizes false positives and successfully detects most redirects to malicious websites.
Keywords
Android
accessibility services
malicious websites
web-based attacks
web security
Published Date
2024
Publication Title
IEEE Access
Volume
volume12
Publisher
Institute of Electrical and Electronics Engineers
Start Page
153285
End Page
153294
ISSN
2169-3536
Content Type
Journal Article
language
English
OAI-PMH Set
岡山大学
Copyright Holders
© 2024 The Authors.
File Version
publisher
DOI
Web of Science KeyUT
Related Url
isVersionOf https://doi.org/10.1109/ACCESS.2024.3478748
License
https://creativecommons.org/licenses/by-nc-nd/4.0/
Funder Name
National Institute of Information and Communications Technology (NICT)