Models and Methodologies

Drive-by-Downloads

(Kamruzzaman, et al,. 2022)

The figure above shows a diagram of a drive-by-download attack. Drive-by-Downloads are one of the endpoint attacks.


What is a Drive-by-Download attack?

Drive-by-Downloads are unintended harmful codes or programs that can be downloaded into a computer or other devices. In order to execute an attack, the culprit will take advantage of vulnerable apps, operating systems, and web browsers. Since the user is oblivious and unaware that they downloaded the destructive code or program, the attack is considered a forced attack.


There are two methods for drive-by-downloads to get in your device:

1-Carrying out an activity that diffuses a dangerous code.

Example: clicking a link - downloading a Trojan horse

2-the culprit will insert a harmful component into a weak point, harming people who visit the website without taking action.

 

Drive-by download attacks can be avoided:

  • Using a computer admin account to download programs. By using this, hackers cannot install harmful programs and codes since they will lack admin privileges.
  • Updating your online browsers, operating systems, and internet security systems. Keeping things up to date will aid in the security of your programs.
  • Staying away from suspicious websites and reading the security pop-ups before clicking on them.


Reference List:

Kamruzzaman, A., Ismat, S., Brickley, J.C., Liu, A. and Thakur, K., 2022, December. A Comprehensive Review of Endpoint Security: Threats and Defenses. In 2022 International Conference on Cyber Warfare and Security (ICCWS) (pp. 1-7). IEEE. Available at: A Comprehensive Review of Endpoint Security: Threats and Defenses | IEEE Conference Publication | IEEE Xplore. [Last Accessed 26th of May 2023]








Comments

Popular Posts