Detection of Obfuscated Malicious Java']JavaScript Code

被引:11
|
作者
Alazab, Ammar [1 ]
Khraisat, Ansam [1 ]
Alazab, Moutaz [2 ]
Singh, Sarabjot [1 ]
机构
[1] Melbourne Inst Technol, Sch Informat Technol & Engn, Melbourne, Vic 3000, Australia
[2] Balqa Appl Univ, Fac Artificial Intelligence, Amman 1705, Jordan
来源
FUTURE INTERNET | 2022年 / 14卷 / 08期
关键词
malware detection; intrusion detection; obfuscated malicious; machine learning; malicious [!text type='Java']Java[!/text]Script;
D O I
10.3390/fi14080217
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal their malice and elude detection. To secure Internet users, an adequate intrusion-detection system (IDS) for malicious JavaScript must be developed. This paper proposes an automatic IDS of obfuscated JavaScript that employs several features and machine-learning techniques that effectively distinguish malicious and benign JavaScript codes. We also present a new set of features, which can detect obfuscation in JavaScript. The features are selected based on identifying obfuscation, a popular method to bypass conventional malware detection systems. The performance of the suggested approach has been tested on JavaScript obfuscation attacks. The studies have shown that IDS based on selected features has a detection rate of 94% for malicious samples and 81% for benign samples within the dimension of the feature vector of 60.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Early detection of malicious behavior in javascript code
    Schütt, Kristof
    Kloft, Marius
    Bikadorov, Alexander
    Rieck, Konrad
    [J]. Proceedings of the ACM Conference on Computer and Communications Security, 2012, : 15 - 24
  • [22] Detecting malicious Java']JavaScript code based on semantic analysis
    Fang, Yong
    Huang, Cheng
    Su, Yu
    Qiu, Yaoyao
    [J]. COMPUTERS & SECURITY, 2020, 93
  • [23] MOJI: Character-level convolutional neural networks for Malicious Obfuscated Java']JavaScript Inspection
    Ishida, Minato
    Kaneko, Naoshi
    Sumi, Kazuhiko
    [J]. APPLIED SOFT COMPUTING, 2023, 137
  • [24] The Power of Obfuscation Techniques in Malicious Java']JavaScript Code: A Measurement Study
    Xu, Wei
    Zhang, Fangfang
    Zhu, Sencun
    [J]. PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 9 - 16
  • [25] JS']JStrong: Malicious Java']JavaScript detection based on code semantic representation and graph neural network
    Fang, Yong
    Huang, Chaoyi
    Zeng, Minchuan
    Zhao, Zhiying
    Huang, Cheng
    [J]. COMPUTERS & SECURITY, 2022, 118
  • [26] Malicious Java']JavaScript Detection Based on Bidirectional LSTM Model
    Song, Xuyan
    Chen, Chen
    Cui, Baojiang
    Fu, Junsong
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (10):
  • [27] Improving Detection Accuracy for Malicious Java']JavaScript Using GAN
    Guo, Junxia
    Cao, Qiyun
    Zhao, Rilian
    Li, Zheng
    [J]. WEB ENGINEERING, ICWE 2020, 2020, 12128 : 163 - 170
  • [28] Research on Malicious Java']JavaScript Detection Technology Based on LSTM
    Fang, Yong
    Huang, Cheng
    Liu, Liang
    Xue, Min
    [J]. IEEE ACCESS, 2018, 6 : 59118 - 59125
  • [29] ScriptNet: Neural Static Analysis for Malicious Java']JavaScript Detection
    Stokes, Jack W.
    Agrawal, Rakshit
    McDonald, Geoff
    Hausknech, Matthew
    [J]. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [30] Detection Approach of Malicious JavaScript Code Based on deep learning
    Zheng, Liyuan
    Zhang, Dongcheng
    Xie, Xin
    Wang, Chen
    Hou, Boyuan
    [J]. Proceedings of 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023, 2023, : 1075 - 1079