LightJD: A Lightweight JavaScript Drive-by Download Detection Framework

被引:0
|
作者
Wang, Tingting [1 ]
Hou, Jing [2 ]
He, Yuxiang [2 ]
Han, Jiaxuan [2 ]
机构
[1] Beijing Institute of Control and Electronics Technology, Beijing, China
[2] School of Cyber Science and Engineering, Sichuan University, Chengdu, China
关键词
Abstract Syntax Trees - BERT - Detection framework - Drive-by downloads - [!text type='Java']Java[!/text]script - Malicious codes - User devices - WEB application - Web applications - Web-page;
D O I
暂无
中图分类号
学科分类号
摘要
34
引用
收藏
页码:190 / 196
相关论文
共 50 条
  • [1] Automated Detection of Drive-by Download Attack
    Kikuchi, Hiroaki
    Matsumoto, Hiroaki
    Ishii, Hiroshi
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 511 - 515
  • [2] 5-2 framework for countering drive-by download
    Kasama, Takahiro
    Matsunaka, Takashi
    Yamada, Akira
    Kubota, Ayumu
    Fujiwara, Nobuyo
    Kawamorita, Kazuo
    Okada, Koichiro
    Journal of the National Institute of Information and Communications Technology, 2016, 63 (02): : 121 - 125
  • [3] Malicious File Hash Detection and Drive-by Download Attacks
    Ghafir, Ibrahim
    Prenosil, Vaclav
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 661 - 669
  • [4] Prediction of drive-by download attacks on Twitter
    Javed, Amir
    Burnap, Pete
    Rana, Omer
    INFORMATION PROCESSING & MANAGEMENT, 2019, 56 (03) : 1133 - 1145
  • [5] Drive-By Download Attacks A Comparative Study
    Sood, Aditya K.
    Zeadally, Sherali
    IT PROFESSIONAL, 2016, 18 (05) : 18 - 25
  • [6] Disrupting drive-by download networks on Twitter
    Javed, Amir
    Ikwu, Ruth
    Burnap, Pete
    Giommoni, Luca
    Williams, Matthew L.
    SOCIAL NETWORK ANALYSIS AND MINING, 2022, 12 (01)
  • [7] Disrupting drive-by download networks on Twitter
    Amir Javed
    Ruth Ikwu
    Pete Burnap
    Luca Giommoni
    Matthew L. Williams
    Social Network Analysis and Mining, 2022, 12
  • [8] Detection of Plug in Misuse Drive-By Download Attacks Using Kernel Machines
    Cherukuri, Manoj
    Mukkamala, Srinivas
    Shin, Dongwan
    2014 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2014, : 546 - 553
  • [9] Emotions Behind Drive-by Download Propagation on Twitter
    Javed, Amir
    Burnap, Pete
    Williams, Matthew L.
    Rana, Omer F.
    ACM TRANSACTIONS ON THE WEB, 2020, 14 (04)
  • [10] A Visual Approach to Detecting Drive-by Download Attacks
    Takada, Tetsuji
    Amako, Katsuhiro
    8TH INTERNATIONAL SYMPOSIUM ON VISUAL INFORMATION COMMUNICATION AND INTERACTION (VINCI 2015), 2015, : 162 - 163