An efficient Security Solution for Dealing with Shortened URL Analysis

Jaime Devesa, Xabier Cantero, Gonzalo Alvarez, Pablo G. Bringas

Abstract

With the boom of the Internet, and particularly of social networks, information sharing possibilities have increased. In this context, the so called URL shortening services, consisting of compacting a web link into a much shorter and manageable one, have arisen. However, the popularity of Web 2.0 also causes users to be unprotected against certain types of unwanted contents and attacks motivated by the desire of economic profit, which translates as an exponential increase in security incidents. Moreover, URL shortening services provide attackers a new method of obfuscation to malicious web links, hindering the analysis and detection of unwanted sites. Thus, we propose here a solution to solve the real destination of a shortened URL, analysing it in terms of security.

References

  1. Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext transfer protocol-HTTP/1.1 (1999)
  2. Alexa Ranking: The web information company (2011) Online: http://www.alexa.com/.
  3. Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web. (1998)
  4. Grier, C., Thomas, K., Paxson, V., Zhang, M.: @ spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM conference on Computer and communications security, ACM (2010) 27-37
  5. Bradley, T.: URL Shortening Frenzy Comes with Security Risks (December 15th 2009) Online: http://www.pcworld.com/businesscenter/article/184677/url shortening frenzy comes with security risks.html.
  6. Computer-Economics: 2007 Malware report: The Economic Impact of Malware (2008) Online: http://www.computereconomics.com/.
  7. Kaspersky-Labs: Kaspersky Security Bulletin: Statistics 2010 (2011) Online: http://www.securelist.com/en/analysis/204792162/Kaspersky Security Bulletin 2010 Statistics 2010.
  8. Fighter, S.: Cyber-criminals Exploiting Shortened URLs for Malware Distribution (April 17th 2010) Online: http://www.spamfighter.com/News-14219-Cyber-criminals-ExploitingShortened-URLs-for-Malware-Distribution.htm.
  9. Secure List: New Twitter worm redirects to Fake AV (January 20th 2011) Online: http://www.securelist.com/en/blog/11136/New Twitter worm redirects to Fake AV.
  10. Petkov, P.D.: Client-Side Security - One year later. Black Hat (2008)
  11. Wu, M., Miller, R., Garfinkel, S.: Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI conference on Human Factors in computing systems, ACM (2006) 601-610
  12. Trusteer: Measuring the Effectiveness of In-the-Wild Phishing Attacks (December 2nd 2009) Online: http://www.trusteer.com/sites/default/files/Phishing-Statistics-Dec-2009-FIN.pdf.
  13. McGrath, D., Gupta, M.: Behind phishing: an examination of phisher modi operandi. In: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, USENIX Association (2008) 1-8
  14. Symantec: State of Spam and Phishing, a monthly report (February 2011) Online: http://www.symantec.com/content/en/us/enterprise/other resources/b-state of spam and phishing report 02-2011.en-us.pdf.
  15. MXLab: Increase in usage of URL shorteners in spam campaigns (January 4th 2011) Online: http://blog.mxlab.eu/2011/01/04/increase-in-usage-of-url-shorteners-in-spam-campaigns/.
  16. Computer Security articles: Unchecked redirection + URL shortener = Spam (February 8th 2011) Online: http://www.computersecurityarticles.info/security/unchecked-redirection-urlshortener-spam/.
  17. Cligs Blog: Cligs Got Hacked (June 15th 2010) Online: http://blog.cli.gs/news/cligs-gothacked-restoration-from-backup-started.
  18. Netcraft: is.gd URL shortener suffers downtime (February 2nd 2011) Online: http://news.netcraft.com/archives/2011/02/02/is-gd-url-shortener-suffers-downtime.html.
  19. Genbeta: Tinyurl blocked by Telefonica all this week (October 23rd 2008) Online: http://www.genbeta.com/web/tinyurl-bloqueado-por-telefonica.
  20. LongURL: URL, LongBrowse with Confidence and Increased Security! (2011) Online: http://longurl.org/.
  21. Mookhey, K., Burghate, N.: Detection of SQL injection and cross-site scripting attacks. Article from: http://www. securityfocus. com/infocus/1768 (2004)
Download


Paper Citation


in Harvard Style

Devesa J., Cantero X., Alvarez G. and G. Bringas P. (2011). An efficient Security Solution for Dealing with Shortened URL Analysis . In Proceedings of the 8th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2011) ISBN 978-989-8425-61-4, pages 70-79. DOI: 10.5220/0003579800700079


in Bibtex Style

@conference{wosis11,
author={Jaime Devesa and Xabier Cantero and Gonzalo Alvarez and Pablo G. Bringas},
title={An efficient Security Solution for Dealing with Shortened URL Analysis},
booktitle={Proceedings of the 8th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2011)},
year={2011},
pages={70-79},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003579800700079},
isbn={978-989-8425-61-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 8th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2011)
TI - An efficient Security Solution for Dealing with Shortened URL Analysis
SN - 978-989-8425-61-4
AU - Devesa J.
AU - Cantero X.
AU - Alvarez G.
AU - G. Bringas P.
PY - 2011
SP - 70
EP - 79
DO - 10.5220/0003579800700079