Home
        Techniques for identifying optimized malicious search engine results
         Contents
1.       pe      e    Sandra Bullock Meryl Streep kiss  youtube          Un       502 Fig  5    U S  Patent Apr  22  2014 Sheet 6 of 6 US 8 707 441   1           Web images Videos Maps News Shopping Gmail            Google  bradsievens               Ssarch  Advanced Search    604 Web HHshow options    Results 11   20 of about 605 000 for brad stevens  0 21 seconds            HM rad evens Facebook  X   ChaCha has the answer to the question  How much does Brad Stevens the coach of  Butler make  Become a ChaCha Fan on Facebook  Follow ChaCha on Twitter        606 designdiagnosis com uwluf php    brad 20stevens 20faceboook   5 hours ago        Brad Stevens Twitter      Brad Stevens  left  describes the Gold Card benefits to customers and   Comment  below or sign in with TypePad Facebook Twitter and more       608 fusion enterprises net tinbd php p brad 20stevens  20twitier   6 hours ago            Brad Stevens Butler     indianapolis Business Journal wrote a note titied Today s 40 UNDER 40 featured  honoree  BRAD STEVENS  Butler men s hoops coach         610 derecho comparada cam bkfxa php    brad 20stevens  20butler   6 hours ago    Brad Stevens Wiki 09   Brad Stevens Buler Coach   Ups Tracking   A Hug From Taylor Swift   Brad Stevens  Wiki   Butler Bulldogs   Jason Mattera Cpac Speech   Youtube com Watch       designedinglass comvivojr php onzbrad9 620stevens 620wiki   5 hours ago         Brad Stevens Wiki     Phladelphia Union Wiki   Stephanie Getz Obituary   Brad Stevens Butler 
2.   In addition to redirec   tion  malicious search result management module 154 may  look for other indicators associated with a potential malicious  search engine result  For example  malicious URLs may have  the patterns    php  lt keyword based text gt          bdoc  lt keyword  based text gt      and or     azcep  lt keyword based text gt        According to some embodiments  a search result may be  flagged for further examination or an administrator may be  notified     US 8 707 441         7    Malware may include misleading applications messages  such as  for example  a fake anti virus software product  a  fake network security software product  a fake anti spyware  software product  a fake computer disk optimization software  product  a fake operating system update software product  a  fake operating system registry tool software product  and or a  fake computer optimization software product  Malware may  also include worms  viruses  and scams    Once malware is detected malicious search result manage   ment module 154 may store data associated with the mali   cious search result  Malicious search result management  module 154 may provide an indication or an alert associated  with the malicious search result    According to some embodiments  malicious search result  management module 154 may be implemented in several  portions which may be co located or located remote from one  another  As discussed above  one or more portions of mali   cious search result management m
3.  Storage devices 160 A 1   N   160B 1   N   and or 180 1     N  may be network accessible storage and may be local   remote  or a combination thereof to server 140A or 140B   Storage devices 160A 1   N   160B 1   N   and or 180 1     N  may utilize a redundant array of inexpensive disks      RAID      magnetic tape  disk  a storage area network    SAN    an Internet small computer systems interface      SCST     SAN  a Fibre Channel SAN  a common Internet  File System   CIFS    network attached storage     NAS          network file system     NFS      optical based storage  or other  computer accessible storage  Storage devices 160A  1   N    160B 1   N   and or 180 1   N  may be used for backup or  archival purposes    According to some embodiments  clients 110  120  and 130  may be smartphones  PDAs  desktop computers  a laptop  computers  servers  other computers  or other devices  coupled via a wireless or wired connection to network 150   Clients 110  120  and 130 may receive data from user input  a  database  a file  a web service  and or an application program   ming interface    Servers 140A and 140E may be application servers  archi   val platforms  backup servers  network storage devices   media servers  email servers  document management plat   forms  enterprise search servers  or other devices communi   catively coupledto network 150  Servers 140A and 140B may  utilize one of storage devices 160A 1   N   160B 1   N    and or 180 1   N  for the storage of applicati
4.  a search is performed  Search result gathering module  312 may receive search results from a gateway  a firewall  or  another network element each time a search is performed   according to some embodiments    In addition to receiving search results from clients or net   work components  Search result gathering module 312 may  identify malicious search results through other methods  For  example  Search result gathering module 312 may access one  or more search engines and may identify popular keywords  periodically  e g   Google Hot trends keywords   Search  result gathering module 312 may use the identified popular  keywords to perform a search at a search engine  Collection of  search results may be prioritized  e g   top 100 search results  analyzed     Search result evaluation module 314 may receive search  results from search result gathering module 312  Search result  evaluation module 314 may navigate to the search result in a  manner that allows navigation to malicious content hidden  using network redirection  For example  search result evalu   ation module 314 may send a network request  e g   an HTTP  GET request  for the content associated with the search result   The network request may be designed to appear to a poten   tially malicious site as if the request came from a user navi   gating from a search result  e g   the Referrer URL may be set  to a search engine page and the user agent may be set to a  browser   Search result evaluation module 314 may identif
5.  hidden using network  redirection  determining that the search item result is associ   ated with malware  and providing an indicator that the search  item result is associated with malware     18 Claims  6 Drawing Sheets       US 8 707 441   1    Sheet 1 of 6    Apr  22  2014    U S  Patent             IEO       Old                      7087 1179091                                                                        yoreas SNOEN              oer          10091 Tees              PST  apon                         ynsey  OZF OST uoJeag                          XJOMJON  NVS                                     061                                                                                                                             youees SNOEN  OLE  WSO          pst                                                      gt  ES               Snoen 2 00  0177091  OGL                                       US 8 707 441   1    Sheet 2 of 6    Apr  22  2014    U S  Patent           Sid          062       X10MJ9N  ozz  772 Jauueyd                  Jexyeeds        jeondo  656 cec ore    sng ISOS pueoghay asnow  222          552 822 926                                                    8552 Hug JejoJjuo2 Od Jeydepy  JaMod olpny ondo                        euas                    che       8rc       eogpieju   XIOMJSN    262          sig           4                                                 ynsey               SNONIJEN    1  J8j 0 400           062    40859204            29  E
6.  limited thereto  Those of ordinary skill in the art having  access to the teachings herein will recognize additional  implementations  modifications  and embodiments  as well as  other fields of use  which are within the scope of the present  disclosure as described herein  and with respect to which the  present disclosure may be of significant utility     BRIEF DESCRIPTION OF THE DRAWINGS    In order to facilitate a fuller understanding of the present  disclosure  reference is now made to the accompanying draw   ings  in which like elements are referenced with like numer   als  These drawings should not be construed as limiting the  present disclosure  but are intended to be exemplary only    FIG  1 shows a block diagram depicting a network archi   tecture for identifying optimized malicious search engine  results in accordance with an embodiment of the present  disclosure    FIG  2 depicts a block diagram of a computer system in  accordance with an embodiment of the present disclosure    FIG 3 shows a module for identifying optimized malicious  search engine results in accordance with an embodiment of  the present disclosure    FIG  4 depicts a method for identifying optimized mali   cious search engine results in accordance with an embodi   ment of the present disclosure    FIG  5 depicts analysis of detection of malicious search  engine results in accordance with an embodiment of the  present disclosure    FIG  6 depicts a user interface indicating detection of mali   ci
7.  remote computing device    In accordance with additional aspects of this particular  exemplary embodiment  the techniques may further comprise  blocking access to the search item result based at least in part  on the determination that the search item result is associated  with malware    In accordance with additional aspects of this particular  exemplary embodiment  the techniques may further comprise  providing a warning associated with the search item result  based at least in part on the determination that the search item  result is associated with malware     US 8 707 441         3    In accordance with additional aspects of this particular  exemplary embodiment  the techniques may further comprise  storing the indicator that the search item result is associated  with malware in a repository    In accordance with additional aspects of this particular  exemplary embodiment  providing an indicator that the  search item result is associated with malware may comprise at  least one of  transmitting the indicator to a client device  component  transmitting the indicator to a gateway  and trans   mitting the indicator to a firewall    In accordance with additional aspects of this particular  exemplary embodiment  the client device component may  comprise a browser component designed to perform one or  more of  denying access to a search item result network site  indicated as associated with malware  providing a warning  about a search item result network site indicated as asso
8.  text gt          bdoc  lt keyword based  text gt      and or     azcp  lt keyword based text gt        According to some embodiments  a search result may be  flagged for further examination or an administrator may be  notified    At block 416 it may be determined whether a search result  and or a related site is malicious  If a search result and or a  related site is malicious the method 400 may continue at block    20    25    30    35    40    45    50    55    60    65    12    420  Ifa search result and or a related site is not malicious the  method 400 may continue at block 418    At block 418  one or more actions may be performed in  response to detection of a malicious search result  An indica   tion of the malicious search result may be stored  Indications  of the malicious search result may be provided to one or more  clients  gateways  firewalls  or other network components   Users may be warned and or denied access to the malicious  search result    At block 420 it may be determined whether additional  search results require analysis  If additional search results  require analysis the method may return to block 410  If no  further search results require analysis the method may end at  block 422    At block 422  the method 400 may end    FIG  5 depicts analysis of detection of malicious search  engine results in accordance with an embodiment of the  present disclosure  According to an exemplary embodiment   analysis 502 of the top twenty five search terms for a pop
9. 4 may be resident in system  memory 217    Storage interface 234  as with the other storage interfaces  of computer system 210  can connect to a standard computer  readable medium for storage and or retrieval of information   such as a fixed disk drive 244  Fixed disk drive 244 may be a  part of computer system 210 or may be separate and accessed  through other interface systems  Modem 247 may provide a  direct connection to a remote server via a telephone link or to  the Internet via an internet service provider  ISP   Network  interface 248 may provide a direct connection to a remote  server via a direct network link to the Internet via a POP  point  of presence   Network interface 248 may provide such con   nection using wireless techniques  including digital cellular  telephone connection  Cellular Digital Packet Data  CDPD   connection  digital satellite data connection or the like    Many other devices or subsystems  not shown  may be  connected in a similar manner  e g   document scanners  digi   tal cameras and so on   Conversely  all of the devices shownin  FIG  2 need not be present to practice the present disclosure   The devices and subsystems can be interconnected in differ   ent ways from that shown in FIG  2  Code to implement the  present disclosure may be stored in computer readable stor   age media such as one or more of system memory 217  fixed  disk 244  optical disk 242  or floppy disk 238  Code to imple   ment the present disclosure may also be received 
10. 5    40    45    50    55    60    65    2    thinking a malicious URL is associated with a particular type  of content which may appear more legitimate or safer  e g   a  PDF file   These measures and others may make optimized  malicious search engine results difficult to detect    In view of the foregoing  it may be understood that there  may be significant problems and shortcomings associated  with current optimized malicious search engine results iden   tification technologies     SUMMARY OF THE DISCLOSURE    Techniques for identifying optimized malicious search  engine results are disclosed  In one particular exemplary  embodiment  the techniques may be realized as a method for  identifying optimized malicious search engine results com   prising receiving a search item result  analyzing  using a  computer processor  the search item result in a secure envi   ronment to detect malicious content hidden using network  redirection  determining that the search item result is associ   ated with malware  and providing an indicator that the search  item result is associated with malware    In accordance with other aspects of this particular exem   plary embodiment  analyzing may comprise automatically  navigating to a network location associated with the search  item result using a network request configured to appear to the  network location as a network request from a user of the  search result    In accordance with further aspects of this particular exem   plary embodiment  th
11. Salary    Urban Meyer        Admissions Activity Center    Brad Stevens Wiki   George      naturally well net mdgvu php  offzbrad 620stevens 620Wiki   5 hours ago              Mar 26  2010     Butler coach Brad Stevens has been the Horizon League Coach of  the Year the past two seasons and has more wins  84  than any      designcreteusa com uftau  php    brad 20stevens 20butler 20salary   6 hours           Searches related to brad stevens  brad stevens butler brad stevens starbucks  bradley stevens bradford stevens  brad savage brad stephens            brad stevens photography  angelina stevens            Gooooooooocoogleb  Previous 1234567891041           Search within results   Lanquage Tools   Search Help   Dissatisfied   Help us improve   Try Google Experimental    Google Home   Advertising Programs   Business Solutions   Privacy   About Google  Fig  6            US 8 707 441         1    TECHNIQUES FOR IDENTIFYING  OPTIMIZED MALICIOUS SEARCH ENGINE  RESULTS    FIELD OF THE DISCLOSURE    The present disclosure relates generally to network secu   rity and  more particularly  to techniques for identifying opti   mized malicious search engine results     BACKGROUND OF THE DISCLOSURE    Search engine optimization  SEO  is a collection of tech   niques used to achieve higher search rankings for a given  website     Black hat SEO    is the method of using unethical  SEO techniques in order to obtain a higher search ranking   These techniques may include things like keyword stuf
12. US008707441B1       az United States Patent  10  Patent No   US 8 707 441   1  Cidambi et al   45  Date of Patent  Apr  22  2014   54  TECHNIQUES FOR IDENTIFYING 2006 0184500 AI  8 2006 Najorket al                        707 1    OPTIMIZED MALICIOUS SEARCH ENGINE  RESULTS     75  Inventors  Chandrasekhar Cidambi  Fremont  CA   US   Nithya Raman  T  Nagar  IN    Tuan Khanh Tran  Santa Ana  CA  US      73  Assignee  Symantec Corporation  Mountain View   CA  US        Notice  Subject to any disclaimer  the term of this   patent is extended or adjusted under 35   U S C  154 b  by 271 days      21  Appl  No   12 858 239     22  Filed  Aug  17  2010   51  Int  Cl   G06F 11 00  2006 01    52  U S  CI   USPC  eei 726 25  726 22  705 51  707 722   58  Field of Classification Search  None    See application file for complete search history    56  References Cited  U S  PATENT DOCUMENTS  6 721 721 B1      7 272 782 B2   7 873 635 B2     4 2004 Bates etal                              1 1  9 2007 Sneh             715 205  1 2011 Wang et al           707 735            8 468 602 B2  6 2013 McDougal et al      726 23  2005 0021740 A1  1 2005 Baretal               709 224  2005 0188361       8 2005 Caietal            717 148    2005 0268338 Al  12 2005 van der Made   da 726 24    2006 0095416 Al  5 2006 Barkhin etal        707 3  2006 0101334 Al1  5 2006 Liao et al          715 523  2006 0136374 Al  6 2006 Shelest et                            707 3              2006 0248072   1  11 2006 Bre
13. a secure environment to   detect malware hidden using network redirection   wherein analyzing comprises automatically navigating  to a network location associated with the search item  result using a network request generated by a server and  configured to appear to the network location as a net   work request from a user of the search result     US 8 707 441       15 16    determine that the search item result is associated with  malware  and   provide an indicator that the search item result is associated  with malware    18  The system of claim 17  wherein the one or more 5   processors are further configured to   identify a popular search term  and  perform a search using the identified popular search term                  
14. ch result in a manner that allows navi   gation to malicious content hidden using network redirection   For example  a network request may be sent  e g   an HTTP  GET request  for the content associated with the search result   The network request may be designed to appear to a poten   tially malicious site as if the request came from a user navi   gating from a search result  e g   the Referrer URL may be set  to a search engine page and the user agent may be set to a  browser     At block 412  it may be determined whether a search result  contains a redirect  e g   it uses an HTTP status 302 code to  redirect to another web page other than that indicated in the  search result URL   Ifa search result uses network redirection  the method 400 may continue at block 414  Ifa search result  does not use network redirection the method may continue at  block 418    At block 414  the method may analyze the search result and  the corresponding site     network request to a potentially  malicious site may be performed in a virtual environment  containing security software  The security software may  detect malware and may prevent malware threats  Security  software may use behavioral analysis  signature based analy   sis  reputation based analysis  and or other methods  In addi   tion to redirection  analysis may include looking for other  indicators associated with a potential malicious search engine  result  For example  malicious URLs may have the patterns     php  lt keyword based
15. ch result to be analyzed first     According to some embodiments  keywords may be pro   vided to malicious search result management module 154 for  searching  For example  a user may provide keywords which  correspond to popular events to a search engine  The search  engine results may be gathered and analyzed  According to  some embodiments  keywords may be obtained from other  network sources  e g   parsed news feeds  trending topics on  a website such as Twitter  etc      Malicious search result management module 154 may  gather data at periodic intervals to ensure detection of new  malicious search engine results  Intervals and hours for data  gathering and analysis may be configurable  e g   hourly   twice a day  daily  on demand  etc      FIG  2 depicts a block diagram ofa computer system 200 in  accordance with an embodiment of the present disclosure   Computer system 200 is suitable for implementing tech   niques in accordance with the present disclosure  Computer  system 200 may include a bus 212 which may interconnect  major subsystems of computer system 210  such as a central  processor 214  a system memory 217  e g  RAM  Random  Access Memory   ROM  Read Only Memory   flash RAM  or  the like   an Input Output        controller 218  an external  audio device  such as a speaker system 220 via an audio  output interface 222  an external device  such as a display  screen 224 via display adapter 226  serial ports 228 and 230   a keyboard 232  interfaced via a keyboard 
16. ciated  with malware  and activating one or more security compo   nents to reduce a threat from a search item result network site  indicated as associated with malware    In accordance with additional aspects of this particular  exemplary embodiment  the gateway may comprise a com   ponent configured to perform one or more of deny access to  search item results indicated as associated with malware  and  filter out search item results indicated as associated with  malware    In accordance with additional aspects of this particular  exemplary embodiment  network redirection may comprise  an HTTP redirection code    In accordance with additional aspects of this particular  exemplary embodiment  the techniques may be realized as at  least one processor readable storage medium for storing a  computer program of instructions configured to be readable  by at least one processor for instructing the at least one pro   cessor to execute a computer process for performing the  method as recited in claim 1    In another particular exemplary embodiment  the tech   niques may be realized as an article of manufacture for iden   tifying optimized malicious search engine results  the article  of manufacture comprising at least one non transitory pro   cessor readable medium  and instructions stored on the at  least one medium  wherein the instructions are configured to  be readable from the at least one medium by at least one  processor and thereby cause the at least one processor to  operate 
17. controller 233   a  storage interface 234  a floppy disk drive 237 operative to  receive a floppy disk 238  a host bus adapter  HBA  interface  card 235A operative to connect with a Fibre Channel network  290  a host bus adapter  HBA  interface card 235B operative  to connect to a SCSI bus 239  and an optical disk drive 240  operative to receive an optical disk 242  Also included may be  a mouse 246  or other point and click device  coupled to bus  212 via serial port 228   amodem 247  coupled to bus 212 via  serial port 230   network interface 248  coupled directly to  bus 212   power manager 250  and battery 252    Bus 212 allows data communication between central pro   cessor 214 and system memory 217  which may include  read only memory  ROM  or flash memory  neither shown    and random access memory  RAM   not shown   as previ   ously noted  The RAM may be the main memory into which    US 8 707 441         9    the operating system and application programs may be  loaded  The ROM or flash memory can contain  among other  code  the Basic Input Output system  BIOS  which controls  basic hardware operation such as the interaction with periph   eral components  Applications resident with computer sys   tem 210 may be stored on and accessed via a computer read   able medium  such as a hard disk drive  e g   fixed disk 244    an optical drive  e g   optical drive 240   a floppy disk unit  2371  or other storage medium  For example  malicious search  result management module 15
18. de at a security software provider  a  service provider or other entity  The virtual environments of  network element 150 may contain security software designed  to protect against malware threats  Malicious search result  management module 154 may receive a search result and may  analyze the search result to determine whether the search  result is associated with malware  Malicious search result  management module 154 may be capable of detecting  cloaked or otherwise optimized  poisoned  or malicious  search engine results    Cloaked URLs may redirect to malware associated content   e g  fake antivirus pages  only when a network request  attribute  e g   the Referrer URL  is a search engine page   Cloaked URLs may not exhibit malicious behavior when  navigated to directly  e g   requested without a referrer URL  indicating a search engine   Additional request attributes may  be verified by a malicious site web server including a user  agent setting and or an IP address  A malicious site web  server may have a configuration file that has been changed by  a hacker to recognize that a user is visiting this fake page after  following a link from a search engine result page based on the  detection of one or more request attributes such as a referrer  URL  a user agent setting  and or an IP address  This request  may then be redirected  e g   using HTTP status code 302 or  another redirection method  to a malware or malicious web  page  which may different from what the search eng
19. e network request may comprise a net   work request containing at least one of a referring search  engine Uniform Resource Locator  URL   a user agent set as  a browser  and a source id set as a browser    In accordance with additional aspects of this particular  exemplary embodiment  the determination may be based  upon at least one of  a signature  behavioral analysis  and  reputation based analysis    In accordance with additional aspects of this particular  exemplary embodiment  the secure environment may com   prise a virtual environment containing security software to  address malware threats    In accordance with additional aspects of this particular  exemplary embodiment  the techniques may further comprise  identifying a popular search term  and performing a search  using the identified popular search term    In accordance with additional aspects of this particular  exemplary embodiment  the popular search term may be  identified by one or more of  using a search engine index of  most popular search terms  collecting one or more statistics  from users associated with search data  and identifying search  terms based on popular current events    In accordance with additional aspects of this particular  exemplary embodiment  the search engine result may be  received from a remote computing device    In accordance with additional aspects of this particular  exemplary embodiment  the indicator that the search item  result is associated with malware may be provided to the 
20. er but may allow  access  Search result protection module 316 may activate  other security software to reduce or prevent a malware threat  associated with a malicious search result  According to some  embodiments  a user may be able to request access to a  malicious search engine result or an administrator may be  able to provide access to a malicious search engine result    Error logging and reporting module 318 may produce logs   reports  or other information associated with identifying opti   mized malicious search engine results    Referring to FIG  4  there is depicted a method 400 for  identifying optimized malicious search engine results in  accordance with an embodiment of the present disclosure  At  block 402  the method 400 may begin    At block 404  one or more popular search items or key   words may be identified  Keywords may be identified by  accessing popular keywords provided by a search engine   e g   Google    Hot trends    According to some embodi   ments  keywords may be received from clients based on client  searches or from gateways or other network components  based on received or transmitted search requests    At block 406  searches may be performed using identified  keywords  Searches may be performed at a plurality of dif   ferent search engines    At block 408  search engine data and result data may be  stored    At block 410  search results may be analyzed in a virtual  environment containing security software  Analysis may  include requesting sear
21. escribes network elements  com   puters  and or components of a system and method for iden   tifying optimized malicious search engine results that may  include one or more modules  As used herein  the term    mod   ule  may be understood to refer to computing software  firm     20    25    30    35    40    45    50    55    60    65    10    ware  hardware  and or various combinations thereof  Mod   ules  however  are not to be interpreted as software which is  not implemented on hardware  firmware  or recorded on a  processor readable recordable storage medium  1 e   modules  are not software per se   It is noted that the modules are  exemplary  The modules may be combined  integrated  sepa   rated  and or duplicated to support various applications  Also   a function described herein as being performed at a particular  module may be performed at one or more other modules  and or by one or more other devices instead of or in addition  to the function performed at the particular module  Further   the modules may be implemented across multiple devices  and or other components local or remote to one another   Additionally  the modules may be moved from one device and  added to another device  and or may be included in both  devices    Search result gathering module 312 may gather search  results from clients  gateways  firewalls  and or other network  elements  according to some embodiments  Clients may pro   vide search results to search result gathering module 312 each  time
22. fing   cloaking  and link farming  which are used to    game    the  search engine algorithms  Hackers may use these techniques  to poison search results of popular search terms to redirect  users to misleading applications  e g   fake antivirus scan   ners  or other malware  Hackers may identify vulnerable  network sites and add numerous additional fake web pages to  these sites  These fake pages may be based on popular search  terms such as  for example  keywords in the Google    Hot  trends    or popular terms in other search engines    For example  malicious Uniform Resource Locators   URLs  returned by searching for    super bow  2010 line    may  include links that hackers want to look legitimate  Hackers  may also add related content to these pages  Each of these  fake web pages may be added without the website owner   s  knowledge or consent  When a user clicks on these links in the  search result page  they may be redirected to fake antivirus  pages or other malware    These search engine optimized pages may distinguish  between a search engine accessing them  a user accessing  them directly  and a user accessing the page by clicking on or  otherwise navigating from a search engine result  Because of  this distinction the web site  which may be a legitimate web   site that has been hacked  may provide different content to  different requesters  A web crawler or other search engine  component accessing the web page may be provided with  content related to a popular ke
23. h item results indicated as associated   with malware  and   filter out search item results indicated as associated with   malware    15  The method of claim 1  where network redirection  comprises an HTTP redirection code    16  An article of manufacture for identifying optimized  malicious search engine results  the article of manufacture  comprising    at least one non transitory processor readable medium  and   instructions stored on the at least one medium    wherein the instructions are configured to be readable from   the at least one medium by at least one processor and   thereby cause the at least one processor to operate so as   to    receive a search item result    analyze the search item result in a secure environment to  detect malware hidden using network redirection   wherein analyzing comprises automatically navigat   ing to a network location associated with the search  item result using a network request generated by a  server and configured to appear to the network loca   tion as a network request from a user of the search  result    determine that the search item result is associated with  malware  and   provide an indicator that the search item result is asso   ciated with malware    17  A system for identifying optimized malicious search  engine results comprising    one or more processors communicatively coupled to a net    work  wherein the one or more processors are config   ured to    receive a search item result    analyze the search item result in 
24. ine spider  actually sees  This may be because a search engine spider or  crawler may send a network request with an IP Address ofthe  originating page request which belongs to the Search engine   The network request from a spider or crawler may also have  a user agent attribute which indicates a search engine  These  attributes may be used by a malicious web site to avoid  redirecting a search engine spider or crawler to the malicious  content    Malicious search result management module 154 may  navigate to the search result in a manner that allows naviga   tion to malicious content hidden using network redirection   For example  malicious search result management module  154 may senda network request  e g   an HTTP GET request   for the content associated with the search result  The network  request may be designed to appear to a potentially malicious  site as if the request came from a user navigating from a  search result  e g   the Referrer URL may be set to a search  engine page and the user agent may be set to a browser    Malicious search result management module 154 may iden   tify search results which use network redirection for further  analysis  A network request to a potentially malicious site  may be performed in a virtual environment containing secu   rity software  The security software may detect malware and  may prevent malware threats  Security software may use  behavioral analysis  signature based analysis  reputation  based analysis  and or other methods
25. losure is not to be limited in scope by the  specific embodiments described herein  Indeed  other various  embodiments of and modifications to the present disclosure   in addition to those described herein  will be apparent to those  of ordinary skill in the art from the foregoing description and  accompanying drawings  Thus  such other embodiments and  modifications are intended to fall within the scope of the  present disclosure  Further  although the present disclosure  has been described herein in the context ofa particular imple   mentation in a particular environment for a particular pur   pose  those of ordinary skill in the art will recognize that its  usefulness is not limited thereto and that the present disclo   sure may be beneficially implemented in any number of envi   ronments for any number of purposes  Accordingly  the  claims set forth below should be construed in view of the full  breadth and spirit of the present disclosure as described  herein     The invention claimed is   1  A method for identifying optimized malicious search  engine results comprising   receiving a search item result   analyzing  using at least one computer processor of a  server  the search item result in a secure environment to  detect malware hidden using network redirection   wherein analyzing comprises automatically navigating  to a network location associated with the search item  result using a network request generated by the server  and configured to appear to the network loca
26. ne or more actions to protect a user  ofthe browser from detected malicious search engine results    According to some embodiments  clients 110  120  and or  130 may provide search results to be analyzed each time a  search is performed  For example  search results may be  provided to network element 150 which may analyze search  results and provide an indication of malicious search results  to the clients  Network element 150 may contain or access a  repository  a database  or other electronic storage containing  data associated with malicious search engine results  Upon  detection of a malicious search engine result this electronic  storage may be updated  Data associated with detected mali   cious search engine results  e g   siteratings  may be provided  to multiple clients so that the result may be appropriately  handled  e g   blocked or flagged by a browser add in or  toolbar  without requiring detection at subsequent clients    According to some embodiments  network element 150  may search results for analysis from a gateway  a firewall  or  another network element each time a search is performed   The flow of search results from clients  gateways  firewalls   and or other network components  may allow malicious  search result management module 154 to identify the most  common or most popular search results  These results may be  the most threatening and or the most likely to be infected with    20    25    30    35    40    45    50    55    60    65    8    maliciou
27. odule 154 may reside on  network element 150 and may analyze and detect malicious  search engine results  Indications of detected malicious  search engine results may be provided to one or more mod   ules of malicious search result management module 154  residing on server 140A and or clients 110  120  and 130    According to some embodiments  server 140A may be a  gateway and malicious search result management module  154 may forward search engine results to network element  150  Server 140A may receive indications of malicious search  engine results from among the provided search engine results   Server 140A may deny access to search engine results indi   cated as malicious by network element 150    According to some embodiments  clients 110  120  and or  130 may contain one or more modules of malicious search  result management module 154 which may send search  engine results to network element 150  Clients 110  120   and or 130 may receive indications of malicious search  engine results from network element 150  If a search engine  result is indicated as malicious one or more modules of mali   cious search result management module 154 residing on a  client may deny access to the search engine result  may pro   vide a warning associated with the search engine result  and   or may activate security software to address a malware threat   For example  a component of malicious search result man   agement module 154 may be a browser plug in or a browser  bar which may perform o
28. on data  backup  data  orother data  Servers 140A and 140B may be hosts  such  as an application server  which may process data traveling  between clients 110  120  and 130 and a backup platform  a  backup process  and or storage    According to some embodiments  clients 110  120  and or  130 may contain one or more portions of software for man   aging optimized malicious search engine results such as  for  example  malicious search result management module 154   As illustrated  one or more portions of malicious search result  management module 154 may reside at a client  One or more  portions of malicious search result management module 154  may reside at a network centric location  For example  server  140A may be a server  a firewall  a gateway  or other network  element that may perform one or more actions to gather   identify  and or block an optimized malicious search engine  result  According to some embodiments  network 190 may be  an external network  e g   the Internet  and server 140A may  be a gateway or firewall between one or more internal com   ponents and clients and the external network  Network ele     20    25    40    45    55    65    6    ment 150 may be a server  a host  orother computing platform  which may contain malicious search result management  module 154    According to some embodiments  network element 150  may contain one or more virtual environments which may be  used to detect optimized malicious search results  Network  element 150 may resi
29. ous search engine results in accordance with an embodi   ment of the present disclosure     DETAILED DESCRIPTION OF EXEMPLARY  EMBODIMENTS    FIG  1 shows a block diagram depicting a network archi   tecture 100 for identifying optimized malicious search engine  results in accordance with an embodiment of the present  disclosure  FIG  1 is a simplified view of network architecture  100  which may include additional elements that are not  depicted  Network architecture 100 may contain client sys   tems 110  120 and 130  as wellas servers 140A and 140B  one  or more of which may be implemented using computer sys   tem 200 shown in FIG  2   Client systems 110  120 and 130  may be communicatively coupled to a network 150  Server  140A may be communicatively coupled to storage devices  160A 1   N   and server 140B may be communicatively  coupled to storage devices 160B 1   N   Servers 140A and  140B may contain a management module  e g   malicious  search result management module 154 of server 140A   Serv   ers 140A and 140B may be communicatively coupled to a  SAN  Storage Area Network  fabric 170  SAN fabric 170  may support access to storage devices 180 1   N  by servers  140A and 140B  and by client systems 110  120 and 130 via  network 150  Server 140A may be communicatively coupled  to network 190  Network element 150 may be communica   tively coupled to network 190  Network element 150 may  contain malicious search result management module 154    With reference to computer s
30. s search engine results  Hackers may update mali   cious search results frequently to ensure their keywords  remain relevant to popular trends and thus are widely distrib   uted  The flow of popular search results from clients  gate   ways  firewalls  and or network components may help iden   tify new threats from malicious sites    In addition to receiving search results from clients or net   work components  malicious search result management mod   ule 154 may identify malicious search results through other  methods  For example  malicious search result management  module 154 may access one or more search engines and may  identify popular keywords periodically  e g   Google Hot  trends keywords   Malicious search result management mod   ule 154 may use the identified popular keywords to perform a  search at a search engine  The received results may be ana   lyzed as described above and indications of malicious search  results may be used to prevent malware threats  Collection of  search results may be prioritized  e g   top 100 search results  analyzed   Analysis of search results may occur in order of  ranking provided by a search engine  According to some  embodiments  analysis of search engine results may be pri   oritized or further prioritized by detection of one or more  indicators in a search item result  e g  patterns     php  lt keyword based text gt          bdoc  lt keyword based  text gt      and or     azcp  lt keyword based text gt  in    URL may  cause a sear
31. so as to  receive a search item result  analyze the  search item result in a secure environment to detect malicious  content hidden using network redirection  determine that the  search item result is associated with malware  and provide an  indicator that the search item result is associated with mal   ware    In yet another particular exemplary embodiment  the tech   niques may be realized as a system for identifying optimized  malicious search engine results comprising one or more pro   cessors communicatively coupled to a network  wherein the  one or more processors are configured to  receive a search  item result  analyze the search item result in a secure envi   ronment to detection malicious content hidden using network  redirection  determine that the search item result is associated  with malware  and provide an indicator that the search item  result is associated with malware    In accordance with additional aspects of this particular  exemplary embodiment  the one or more processors may  further be configured to  identify a popular search term  and  perform a search using the identified popular search term    The present disclosure will now be described in more detail  with reference to exemplary embodiments thereof as shown  in the accompanying drawings  While the present disclosure  is described below with reference to exemplary embodi     20    25    30    35    40    45    50    55    65    4    ments  it should be understood that the present disclosure is  not
32. ther comprising blocking  access to the search item result based at least in part on the  determination that the search item result is associated with  malware     20    25    30    35    40    45    50    55    60    65    14    10  The method of claim 1  further comprising providing a  warning associated with the search item result based at least  in part on the determination that the search item result is  associated with malware    11  The method of claim 1  further comprising storing the  indicator that the search item result is associated with mal   ware in a repository    12  The method of claim 1  wherein providing an indicator  that the search item result is associated with malware com   prises at least one of    transmitting the indicator to a client device component    transmitting the indicator to a gateway  and   transmitting the indicator to a firewall    13  The method of claim 12  wherein the client device  component comprises a browser component designed to per   form one or more of    denying access to a search item result network site indi    cated as associated with malware    providing a warning about a search item result network site   indicated as associated with malware  and   activating one or more security components to reduce a   threat from a search item result network site indicated as  associated with malware    14  The method of claim 12  wherein the gateway com   prises    a component configured to perform one or more of    deny access to searc
33. tion as a  network request from a user of the search result    determining that the search item result is associated with  malware  and   providing an indicator that the search item result is associ    ated with malware    2  The method of claim 1  wherein the network request  comprises a network request containing at least one of  a  referring search engine Uniform Resource Locator  URL   a  user agent set as a browser  and a source id set as a browser    3  The method of claim 1  wherein the determination is  based upon at least one of  a signature  behavioral analysis   and reputation based analysis    4  The method of claim 1  wherein the secure environment  comprises a virtual environment containing security software  to address malware threats    5  The method of claim 1  further comprising    identifying a popular search term  and   performing a search using the identified popular search   term    6  The method of claim 5  wherein the popular search term  is identified by one or more of    using a search engine index of most popular search terms    collecting one or more statistics from users associated with   search data  and   identifying search terms based on popular current events    7  The method of claim 1  wherein the search engine result  is received from a remote computing device    8  The method of claim 7  wherein the indicator that the  search item result is associated with malware is provided to  the remote computing device    9  The method of claim 1  fur
34. twork component when requested by a client  The gateway   firewall  or other network component may provide a message  at that time  e g      Request denied due to detection of mali   cious content     At this point it should be noted that identifying optimized  malicious search engine results in accordance with the  present disclosure as described above typically involves the  processing of input data and the generation of output data to  some extent  This input data processing and output data gen   eration may be implemented in hardware or software  For  example  specific electronic components may be employed in  an optimized malicious search engine results identification  module or similar or related circuitry for implementing the  functions associated with identifying optimized malicious  search engine results in accordance with the present disclo   sure as described above  Alternatively  one or more proces   sors operating in accordance with instructions may imple   ment the functions associated with identifying optimized  malicious search engine results in accordance with the  present disclosure as described above  If such is the case  it is  within the scope of the present disclosure that such instruc   tions may be stored on one or more processor readable storage  media  e g   a magnetic disk or other storage medium   or    US 8 707 441         13    transmitted to one or more processors via one or more signals  embodied in one or more carrier waves    The present disc
35. ular  event such as for example  the 2010 Oscars  may show the  total number of clean and malicious search results out of the  first hundred or so search results  The total number of mali   cious search results for a set of search terms may prioritize  analysis for further user requests  For example  as illustrated  in row 1  the search terms    oscar ballot 2010 printable     resulted in 75 search results which were identified as mali   cious out of the first 102 search results  This may be higher  than other sets of search terms for the same topic  e g   the  2010 Oscars   Thus subsequent searches with similar or iden   tical keywords may be given higher priority for analysis   according to some embodiments  According to other embodi   ments  priority for analysis may be based on search engine  keyword rankings or on rankings of searches received from  clients    FIG  6 depicts a user interface 602 indicating detection of  malicious search engine results in accordance with an  embodiment of the present disclosure  As illustrated in FIG   6  indicators 604  606  608  610  and other unlabeled search  result indicators may indicate that a search result is malicious   Different indicators may be used  According to some embodi   ments  indicators may indicate levels of threats  warnings  or  denial of access to search results  According to some embodi   ments  search results may not contain an indicator but a search  result may be blocked by a gateway  a firewall  or another  ne
36. ust        206 212 00z                                       852           0901    US 8 707 441   1    Sheet 3 of 6    Apr  22  2014    U S  Patent              Big    815 915                                                                puy              10113                            PLE         ejnpojN uonenje 3                                      ynsey uoees yinsey youeas    OLE                                        1nsa   eulbuy uo1eeg Snoen    U S  Patent Apr  22  2014 Sheet 4 of 6 US 8 707 441   1    402    identify Popular Search Items  404  406 Perform Searches And Gather Results  408 Store Search Engine Data and Result Data  410 Analyze Search Results In a Secure Environment    Does  Search  Result Contain A  Redirect                412    Yes    Analyze Corresponding Site    414       418    U S  Patent Apr  22  2014 Sheet 5 of 6 US 8 707 441   1     SNo  Search Terms   Glean_  Malicious   Total    oscar ballot 2010 printable             oscars 2010 schedule 55 1 we       5   sesfreytethe _             35 e          195            6   oscars 2010 tv schedule       henewimans fe fe pom                    192    saram     4i              105       oscar winners 2070          2   barbara walters oscar special2010_ 40      92      102  music by prudens Ja        booth gardner documentary      43  5                        ti f5   gt   academy        200 ime      s                    1 5  E RENE   4                        an                          bo       fmt fp  
37. via one or  more interfaces and stored in memory  The operating system  provided on computer system 210 may be MS DOS    MS   WINDOWS    OS 2    OS       UNIX    Linux    or another  known operating system    Power manager 250 may monitor a power level of battery  252  Power manager 250 may provide one or more APIs   Application Programming Interfaces  to allow determina   tion of a power level  of a time window remaining prior to  shutdown of computer system 200  a power consumption  rate  an indicator of whether computer system is on mains   e g   AC Power  or battery power  and other power related  information  According to some embodiments  APIs of power  manager 250 may be accessible remotely  e g   accessible to  a remote backup management module via a network connec   tion   According to some embodiments  battery 252 may be  an Uninterruptable Power Supply  UPS  located either local  to or remote from computer system 200  In such embodi   ments  power manager 250 may provide information about a  power level of an UPS    Referring to FIG  3  there is shown a malicious search  engine result management module 310 in accordance with an  embodiment of the present disclosure  As illustrated  the  malicious search engine result management module 310 may  contain one or more components including search result gath   ering module 312  search result evaluation module 314   search result protection module 316  and error logging and  reporting module 318    The description below d
38. wer et al       707 5  2007 0180356 Al  8 2007 Sun                 715 511  2008 0301281   1  12 2008 Wang etal             709 224  2009 0089296 Al  4 2009 Stemeseder et al               707 10  2010 0037314 Al  2 2010 Perdiscietal                    726 22  2010 0138485 Al  6 2010 Chow etal         709 203  2010 0293185   1  11 2010 Rosado et al     707 769  2011 0197281 A1  8 2011 Almeetal                        726 24    OTHER PUBLICATIONS    TrendSecure  TrendProtect    Overview  Trend Micro  Inc   2010  2  pages  found at http   www trendsecure com portal en US tools se   curity_tools trendprotect overview    McAfee  McAfee SiteAdvisor    The State of Search Engine Safety   McAfee  Inc   2010  15 pages  found at http   www siteadvisor com   studies search safety may2007    AVG  AVG LinkScanner User Manual  AVG Technologies CZ  2010         1 47  found at http   download avg com filedir doc FREE__  PRODUCTS SALS avg lsf uma en 90 6 pdf       cited by examiner    Primary Examiner     Hung Le   74  Attorney  Agent  or Firm     Wilmer Cutler Pickering  Hale and Dorr LLP     57  ABSTRACT    Techniques for identifying optimized malicious search  engine results are disclosed  In one particular exemplary  embodiment  the techniques may be realized as a method for  identifying optimized malicious search engine results com   prising receiving a search item result  analyzing  using a  computer processor  the search item result in a secure envi   ronment to detect malicious content
39. y  search results which use network redirection for further  analysis  A network request to a potentially malicious site  may be performed in a virtual environment containing secu   rity software  The security software may detect malware and  may prevent malware threats  Security software may use  behavioral analysis  signature based analysis  reputation  based analysis  and or other methods  In addition to redirec   tion  search result evaluation module 314 may look for other  indicators associated with a potential malicious search engine  result  For example  malicious URLs may have the patterns     php  lt keyword based text gt          bdoc  lt keyword based  text gt      and or     azcp  lt keyword based text gt        According to some embodiments  a search result may be  flagged for further examination or an administrator may be  notified    Search result evaluation module 314 may store indicators  or malicious or poisoned search results in electronic storage  such as a database  Indicators may be provided to one or more  clients  gateways  firewalls  or other components to provide  malware protection     US 8 707 441         11    Search result protection module 316 may receive an indi   cator of malicious search results from search result evaluation  module 314  Search result protection module 316 may block  access or deny access to a malicious search results  Search  result protection module 316 may be configurable  Search  result protection module 316 may warn a us
40. ystem 200 of FIG  2  modem  247  network interface 248  or some other method may be  used to provide connectivity from one or more of client sys   tems 110  120 and 130 to network 150  Client systems 110   120 and 130 may be able to access information on server  140A or 140B using  for example  a web browser or other  client software  not shown   Such a client may allow client    US 8 707 441         5  systems 110  120 and 130 to access data hosted by server  140A or 140B or one of storage devices 160A 1   N   160B   1   N   and or 180 1   N     Networks 150 and 190 may be local area networks  LANs    wide area networks  WANG   the Internet  cellular networks   satellite networks  or other networks that permit communica   tion between clients 110  120  130  servers 140  and other  devices communicatively coupled to networks 150 and 190   Networks 150 and 190 may further include one  or any num   ber  of the exemplary types of networks mentioned above  operating as a stand alone network or in cooperation with  each other  Networks 150 and 190 may utilize one or more  protocols of one or more clients or servers to which they are  communicatively coupled  Networks 150 and 190 may trans   late to or from other protocols to one or more protocols of  network devices  Although networks 150 and 190 are each  depicted as one network  it should be appreciated that accord   ing to one or more embodiments  networks 150 and 190 may  each comprise a plurality of interconnected networks   
41. yword  A person navigating  directly to the web page may receive a normal web page  e g    a web page associated with the site before it was hacked    However  a person navigating to the site via a search engine  result may be redirected to a site associated with malware   e g   a URL which downloads malware to a client  a site  offering misleading applications  or another malware site    Because a person navigating directly to the webpage may not  discover the malware  the malware may remain hidden  longer  Because the malware associated site may use keyword  stuffing of popular keywords and link farming the malware  may achieve a high ranking on one or more search engines   This may allow the malware to be effectively distributed   However  the pages upon which the search results are based  may not be the pages that will be returned when a user clicks  on the search result  Instead the user may be redirected to a  malware site  This may provide a challenge to normal meth   ods used to detect and prevent malware  Additionally  these  sites may frequently change and may be updated to respond to  new popular keywords or trends  A hacker may use other  methods to make search results look legitimate  Some hacked  or malware sites may trick a search engine into thinking they  are a legitimate site  e g   CNN   The malicious search result  may then display as if it were from the legitimate website   Some hacked or malware sites may trick a search engine into    20    25    30    3
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
MODE D`EMPLOI - Alpha Surveillance  SOLIDARITÉS - Ministère de la santé  2007年9月版  RX415 User`s Guide  Introduction FlipAlbum CD Maker 1.2 creates exciting digital photo  Roomba Owner`s Manual  Bañera de hidromasaje Whirlpool bathtub    SS user manual - Sena Technologies, Inc.  TFIR-3171N/    Copyright © All rights reserved. 
   Failed to retrieve file