ScriptNet: Neural Static Analysis for Malicious Java']JavaScript Detection

被引:7
|
作者
Stokes, Jack W. [1 ]
Agrawal, Rakshit [2 ]
McDonald, Geoff [3 ]
Hausknech, Matthew [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
[2] Univ Calif Santa Cruz, Santa Cruz, CA 95064 USA
[3] Microsoft Corp, 305 876 14th Ave W, Vancouver, BC V5Z 1R1, Canada
关键词
Malware detection; Neural models; LSTM;
D O I
10.1109/milcom47813.2019.9020870
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious scripts are an important computer infection threat vector for computer users. For internet-scale processing, static analysis offers substantial computing efficiencies. We propose the ScriptNet system for neural malicious JavaScript detection which is based on static analysis. We also propose a novel deep learning model, Pre-Informant Learning (PIL), which processes Javascript files as byte sequences. Lower layers capture the sequential nature of these byte sequences while higher layers classify the resulting embedding as malicious or benign. Unlike previously proposed solutions, our model variants are trained in an end-to-end fashion allowing discriminative training even for the sequential processing layers. Evaluating this model on a large corpus of 212,408 JavaScript files indicates that the best performing PIL model offers a 98.10% true positive rate (TPR) for the first 60K byte subsequences and 81.66% for the full-length files, at a false positive rate (FPR) of 0.50%. Both models significantly outperform several baseline models. The best performing PIL model can successfully detect 92.02% of unknown malware samples in a hindsight experiment where the true labels of the malicious JavaScript files were not known when the model was trained.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Static Detection of Malicious Java']JavaScript-Bearing PDF Documents
    Laskov, Pavel
    Srndic, Nedim
    [J]. 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 373 - 382
  • [2] JS']JSTAP: A Static Pre-Filter for Malicious Java']JavaScript Detection
    Fass, Aurore
    Backes, Michael
    Stock, Ben
    [J]. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 257 - 269
  • [3] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    [J]. 2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374
  • [4] Malicious Java']JavaScript Detection by Features Extraction
    Canfora, Gerardo
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    [J]. E-INFORMATICA SOFTWARE ENGINEERING JOURNAL, 2014, 8 (01) : 65 - 78
  • [5] Detection of malicious java']javascript on an imbalanced dataset
    Phung, Ngoc Minh
    Mimura, Mamoru
    [J]. INTERNET OF THINGS, 2021, 13
  • [6] Detection of Obfuscated Malicious Java']JavaScript Code
    Alazab, Ammar
    Khraisat, Ansam
    Alazab, Moutaz
    Singh, Sarabjot
    [J]. FUTURE INTERNET, 2022, 14 (08):
  • [7] Deep Neural Networks for Malicious Java']JavaScript Detection Using Bytecode Sequences
    Rozi, Muhammad Fakhrur
    Kim, Sangwook
    Ozawa, Seiichi
    [J]. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,
  • [8] Analysis and Identification of Malicious Java']JavaScript Code
    Fraiwan, Mohammad
    Al-Salman, Rami
    Khasawneh, Natheer
    Conrad, Stefan
    [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (01): : 1 - 11
  • [9] Obfuscated Malicious Java']JavaScript Detection by Machine Learning
    Pan, Jinkun
    Mao, Xiaoguang
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 805 - 810
  • [10] Static Analysis of Malicious Java']Java Applets
    Ganesh, Nikitha
    Di Troia, Fabio
    Corrado, Visaggio Aaron
    Austin, Thomas H.
    Stamp, Mark
    [J]. IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, : 58 - 63