Skip to main content

Studying Malicious Websites and the Underground Economy on the Chinese Web

  • Chapter
  • First Online:
Managing Information Risk and the Economics of Security

Abstract

The World Wide Web gains more and more popularity within China with more than 1.31 million websites on the Chinese Web in June 2007. Driven by the economic profits, cyber criminals are on the rise and use the Web to exploit innocent users. In fact, a real underground black market with thousands of parti cipants has developed, which brings together malicious users who trade exploits, malware, virtual assets, stolen credentials, and more. In this chapter, we provide a detailed overview of this underground black market and present a model to describe the market. We substantiate our model with the help of measurement results within the Chinese Web. First, we show that the amount of virtual assets traded on this underground market is huge. Second, our research proves that a significant amount of websites within China’s part of the Web contain some kind of malicious content: our measurements reveal that about 1.49% of the examined sites contain malicious content that tries to attack the visitor’s browser.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Alexa, The Web Information Company. Global Top 500 Sites, May 2008.http://alexa.com/site/ds/top_sites?ts_mode=global.

  • China Internet Network Information Center (CNNIC). 20th Statistical Reports on the Internet Development in China, July 2007.http://cnnic.cn/download/2007/20thCNNICreport-en.pdf.

  • Franklin, J., Paxson, V., Perrig, A., and Savage, S. “An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants,” in Proceedings of ACM Conference on Computer and Communications Security, 2007.

    Google Scholar 

  • Moshchuk, A., Bragin, T., Gribble, S.D., and Levy, H.M. “A Crawler-based Study of Spyware in the Web,” in Proceedings of 13th Network and Distributed System Security Symposium ( NDSS’06 ), 2006.

    Google Scholar 

  • Provos, N. and Holz, T. Virtual Honeypots: From Botnet Tracking to Intrusion Detection, Addison-Wesley, July 2007.

    Google Scholar 

  • Provos, N., Mavrommatis, P., Rajab, M. A., and Monrose, F. “All Your iFrames Point to Us,” in Proceedings of 17th USENIX Security Symposium, 2008.

    Google Scholar 

  • Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadugu, N. “The Ghost in the Browser: Analysis of Web-based Malware,” in Proceedings of HotBots 2007, 2007.

    Google Scholar 

  • Team Cymru. “Cybercrime: An Epidemic,” ACM Queue (4:9), 2006, pp. 24–35.

    Google Scholar 

  • The Honeynet Project. Know Your Enemy: Malicious Web Servers, August 2007.http://www. honeynet.org/papers/mws/.

    Google Scholar 

  • The Honeynet Project. Know Your Enemy: Web Application Threats, February 2007.http://www.honeynet.org/papers/webapp/.

  • Thomas, R., and Martin, J. “The Underground Economy: Priceless,” USENIX;login: (31:6), 2006, pp. 7–16..

    Google Scholar 

  • Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., and King, S. T. “Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities,” in Proceedings of 13th Network and Distributed System Security Symposium ( NDSS’06 ), 2006.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Zhuge, J., Holz, T., Song, C., Guo, J., Han, X., Zou, W. (2009). Studying Malicious Websites and the Underground Economy on the Chinese Web. In: Johnson, M.E. (eds) Managing Information Risk and the Economics of Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09762-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-09762-6_11

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-09761-9

  • Online ISBN: 978-0-387-09762-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics