An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors

被引:0
|
作者
Ren, Kunlun [1 ,3 ]
Qiang, Weizhong [1 ,3 ,4 ]
Wu, Yueming [2 ]
Zhou, Yi [1 ,3 ]
Zou, Deqing [1 ,3 ,4 ]
Jin, Hai [1 ,4 ,5 ]
机构
[1] Huazhong University of Science and Technology, Wuhan, China
[2] Nanyang Technological University, Singapore
[3] National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hust, Wuhan,430074, China
[4] Jinyinhu Laboratory, Wuhan, China
[5] National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Hust, Wuhan,430074, China
关键词
Engineering Village;
D O I
暂无
中图分类号
学科分类号
摘要
Empirical studies - Javascript obfuscations - Machine-learning - Malicious behavior - Malicious javascript - Malicious javascript detector - Manual identification - Training sets - Web attacks - WEB security
引用
收藏
页码:1420 / 1432
相关论文
共 50 条
  • [41] Machine Learning-Based Study on Brain Science in Aviation
    Tang, Z. R.
    Qiu, Xu-Yi
    Yang, Xizhong
    Wu, Edmond Q.
    [J]. INTERNATIONAL JOURNAL OF PSYCHOPHYSIOLOGY, 2021, 168 : S197 - S197
  • [42] EMPIRICAL COMPARISON AND ANALYSIS OF MACHINE LEARNING-BASED APPROACHES FOR DRUGGABLE PROTEIN IDENTIFICATION
    Shoombuatong, Watshara
    Schaduangrat, Nalini
    Nikom, Jaru
    [J]. EXCLI JOURNAL, 2023, 22 : 915 - 927
  • [43] Empirical assessment of machine learning-based malware detectors for Android Measuring the gap between in-the-lab and in-the-wild validation scenarios
    Allix, Kevin
    Bissyande, Tegawende F.
    Jerome, Quentin
    Klein, Jacques
    State, Radu
    Le Traon, Yves
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2016, 21 (01) : 183 - 211
  • [44] Assessment of Infiltration Rate of Soil Using Empirical and Machine Learning-Based Models
    Kumar, Munish
    Sihag, Parveen
    [J]. IRRIGATION AND DRAINAGE, 2019, 68 (03) : 588 - 601
  • [45] Certified Robustness of Static Deep Learning-based Malware Detectors against Patch and Append Attacks
    Gibert, Daniel
    Zizzo, Giulio
    Le, Quan
    [J]. PROCEEDINGS OF THE 16TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2023, 2023, : 173 - 184
  • [46] An empirical analysis of data preprocessing for machine learning-based software cost estimation
    Huang, Jianglin
    Li, Yan-Fu
    Xie, Min
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 67 : 108 - 127
  • [47] Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis
    Parnika Bhat
    Sunny Behal
    Kamlesh Dutta
    [J]. Proceedings of the Indian National Science Academy, 2023, 89 : 429 - 444
  • [48] Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis
    Bhat, Parnika
    Behal, Sunny
    Dutta, Kamlesh
    [J]. PROCEEDINGS OF THE INDIAN NATIONAL SCIENCE ACADEMY, 2023, 89 (03): : 429 - 444
  • [49] Deobfuscation, unpacking, and decoding of obfuscated malicious Java']JavaScript for machine learning models detection performance improvement
    Ndichu, Samuel
    Kim, Sangwook
    Ozawa, Seiichi
    [J]. CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2020, 5 (03) : 184 - 192
  • [50] Machine Learning on Merging Static and Dynamic Features to Identify Malicious Mobile Apps
    Su, Ming-Yang
    Chang, Jer-Yuan
    Fung, Kek-Tung
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 863 - 867