Drive-By Download Attacks: A Comparative Study

Aditya K. Sood, Sherali Zeadally

Research output: Contribution to journalArticlepeer-review

17 Scopus citations


Malware authors are exploiting browsers in a stealthy manner to distribute infectious code on the Internet. Drive-by download attacks are a prominent attack method in support of this cause. During such attacks, well-designed automated applications called browser exploit packs (BEPs) are deployed on infected servers. The authors' feature-oriented study analyzes the built-in features provided by BEPs used in the successful execution of drive-by downloads.

Original languageEnglish
Article number7579103
Pages (from-to)18-25
Number of pages8
JournalIT Professional
Issue number5
StatePublished - Sep 1 2016


  • browser exploit packs (BEPs)
  • cybercrime
  • drive-by downloads
  • Internet computing
  • Internet security
  • targeted attacks

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Science Applications


Dive into the research topics of 'Drive-By Download Attacks: A Comparative Study'. Together they form a unique fingerprint.

Cite this