JACLNet:Application of adaptive code length network in Java']JavaScript malicious code detection

被引:0
|
作者
Zhang, Zhining [1 ]
Wan, Liang [1 ]
Chu, Kun [1 ]
Li, Shusheng [1 ]
Wei, Haodong [1 ]
Tang, Lu [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang, Peoples R China
来源
PLOS ONE | 2022年 / 17卷 / 12期
关键词
D O I
10.1371/journal.pone.0277891
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Currently, JavaScript malicious code detection methods are becoming more and more effective. Still, the existing methods based on deep learning are poor at detecting too long or too short JavaScript code. Based on this, this paper proposes an adaptive code length deep learning network JACLNet, composed of convolutional block RDCNet, BiLSTM and Transfrom, to capture the association features of the variable distance between codes. Firstly, an abstract syntax tree recombination algorithm is designed to provide rich syntax information for feature extraction. Secondly, a deep residual convolution block network (RDCNet) is designed to capture short-distance association features between codes. Finally, this paper proposes a JACLNet network for JavaScript malicious code detection. To verify that the model presented in this paper can effectively detect variable JavaScript code, we divide the datasets used in this paper into long text dataset DB_Long; short text dataset DB_Short, original dataset DB_Or and enhanced dataset DB_Re. In DB_Long, our method's F1 - score is 98.87%, higher than that of JSContana by 2.52%. In DB_Short, our method's F1-score is 97.32%, higher than that of JSContana by 7.79%. To verify that the abstract syntax tree recombination algorithm proposed in this paper can provide rich syntax information for subsequent models, we conduct comparative experiments on DB_Or and DB_Re. In DPCNN+BiLSTM, F1-score with abstract syntax tree recombination increased by 1.72%, and in JSContana, F1-score with abstract syntax tree recombination increased by 1.50%. F1-score with abstract syntax tree recombination in JACNet improved by 1.00% otherwise unused.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Detection of Obfuscated Malicious Java']JavaScript Code
    Alazab, Ammar
    Khraisat, Ansam
    Alazab, Moutaz
    Singh, Sarabjot
    [J]. FUTURE INTERNET, 2022, 14 (08):
  • [2] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    [J]. 2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374
  • [3] Detecting malicious Java']JavaScript code in Mozilla
    Hallaraker, O
    Vigna, G
    [J]. ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 85 - 94
  • [4] Analysis and Identification of Malicious Java']JavaScript Code
    Fraiwan, Mohammad
    Al-Salman, Rami
    Khasawneh, Natheer
    Conrad, Stefan
    [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (01): : 1 - 11
  • [5] Polymorphic Malicious Java']JavaScript Code Detection for APT Attack Defence
    Choi, Junho
    Choi, Chang
    You, Ilsun
    Kim, Pankoo
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 369 - 383
  • [6] JS']JStrong: Malicious Java']JavaScript detection based on code semantic representation and graph neural network
    Fang, Yong
    Huang, Chaoyi
    Zeng, Minchuan
    Zhao, Zhiying
    Huang, Cheng
    [J]. COMPUTERS & SECURITY, 2022, 118
  • [7] Early detection of malicious behavior in javascript code
    Schütt, Kristof
    Kloft, Marius
    Bikadorov, Alexander
    Rieck, Konrad
    [J]. Proceedings of the ACM Conference on Computer and Communications Security, 2012, : 15 - 24
  • [8] A deep learning approach for detecting malicious Java']JavaScript code
    Wang, Yao
    Cai, Wan-dong
    Wei, Peng-cheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1520 - 1534
  • [9] Detecting malicious Java']JavaScript code based on semantic analysis
    Fang, Yong
    Huang, Cheng
    Su, Yu
    Qiu, Yaoyao
    [J]. COMPUTERS & SECURITY, 2020, 93
  • [10] The Power of Obfuscation Techniques in Malicious Java']JavaScript Code: A Measurement Study
    Xu, Wei
    Zhang, Fangfang
    Zhu, Sencun
    [J]. PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 9 - 16