A deep learning approach for detecting malicious Java']JavaScript code

被引:90
|
作者
Wang, Yao [1 ]
Cai, Wan-dong [1 ]
Wei, Peng-cheng [1 ]
机构
[1] Northwestern Polytech Univ, Dept Comp Sci & Technol, Xian, Peoples R China
关键词
!text type='Java']Java[!/text]Script attacks; static analysis; deep learning; SdA; logistic regression; random projection;
D O I
10.1002/sec.1441
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious JavaScript code in webpages on the Internet is an emergent security issue because of its universality and potentially severe impact. Because of its obfuscation and complexities, detecting it has a considerable cost. Over the last few years, several machine learning-based detection approaches have been proposed; most of them use shallow discriminating models with features that are constructed with artificial rules. However, with the advent of the big data era for information transmission, these existing methods already cannot satisfy actual needs. In this paper, we present a new deep learning framework for detection of malicious JavaScript code, from which we obtained the highest detection accuracy compared with the control group. The architecture is composed of a sparse random projection, deep learning model, and logistic regression. Stacked denoising auto-encoders were used to extract high-level features from JavaScript code; logistic regression as a classifier was used to distinguish between malicious and benign JavaScript code. Experimental results indicated that our architecture, with over 27000 labeled samples, can achieve an accuracy of up to 95%, with a false positive rate less than 4.2% in the best case. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1520 / 1534
页数:15
相关论文
共 50 条
  • [21] Detecting Malicious Assembly with Deep Learning
    Santacroce, M.
    Koranek, Daniel
    Kapp, David
    Ralescu, Anca
    Jha, R.
    NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 82 - 85
  • [22] Detecting Malicious Java']JavaScript Using Structure-Based Analysis of Graph Representation
    Rozi, Muhammad Fakhrur
    Ban, Tao
    Ozawa, Seiichi
    Yamada, Akira
    Takahashi, Takeshi
    Kim, Sangwook
    Inoue, Daisuke
    IEEE ACCESS, 2023, 11 : 102727 - 102745
  • [23] Deep Neural Networks for Malicious Java']JavaScript Detection Using Bytecode Sequences
    Rozi, Muhammad Fakhrur
    Kim, Sangwook
    Ozawa, Seiichi
    2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,
  • [24] Malicious Java']JavaScript Detection by Features Extraction
    Canfora, Gerardo
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    E-INFORMATICA SOFTWARE ENGINEERING JOURNAL, 2014, 8 (01) : 65 - 78
  • [25] Detection of malicious java']javascript on an imbalanced dataset
    Phung, Ngoc Minh
    Mimura, Mamoru
    INTERNET OF THINGS, 2021, 13
  • [26] Evaluating a Visual Approach for Understanding Java']JavaScript Source Code
    Dias, Martin
    Orellana, Diego
    Vidal, Santiago
    Merino, Leonel
    Bergel, Alexandre
    2020 IEEE/ACM 28TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION, ICPC, 2020, : 128 - 138
  • [27] Access Control to Prevent Malicious Java']JavaScript Code Exploiting Vulnerabilities of WebView in Android OS
    Yu, Jing
    Yamauchi, Toshihiro
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (04): : 807 - 811
  • [28] A Protection Mechanism against Malicious HTML']HTML and Java']JavaScript Code in Vulnerable Web Applications
    Liu, Shukai
    Yan, Xuexiong
    Wang, Qingxian
    Zhao, Xu
    Chai, Chuansen
    Sun, Yajing
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [29] Spider bird swarm algorithm with deep belief network for malicious Java']JavaScript detection
    Alex, Scaria
    Dhiliphan Rajkumar, T.
    COMPUTERS & SECURITY, 2021, 107
  • [30] Early detection of malicious behavior in javascript code
    Schütt, Kristof
    Kloft, Marius
    Bikadorov, Alexander
    Rieck, Konrad
    Proceedings of the ACM Conference on Computer and Communications Security, 2012, : 15 - 24