Malicious Java']JavaScript Code Detection Based on Hybrid Analysis

被引:15
|
作者
He, Xincheng [1 ,2 ]
Xu, Lei [1 ,2 ]
Cha, Chunliu [1 ,2 ]
机构
[1] Nanjing Univ, Dept Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious Code Detection; Hybrid Analysis; Machine Learning; De-obfuscation; OBFUSCATION;
D O I
10.1109/APSEC.2018.00051
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
JavaScript plays an important role in web applications and services, which is used by millions of web pages in optimizing interface design, embedding dynamic texts, reading and writing HTML elements, validating form data, responding to browser events, controlling cookies and much more. However, since JavaScript is cross-platform and can be executed dynamically, it has been a major vehicle for web-based attacks. Existing solutions work by performing static analysis or monitoring program execution dynamically. However, since the heavy use of obfuscation techniques, many methods no longer apply to malicious JavaScript code detection, and it has been a huge challenge to de-obfuscate obfuscated malicious JavaScript code accurately. In this paper, we propose a hybrid analysis method combining static and dynamic analysis for detecting malicious JavaScript code that works by first conducting syntax analysis and dynamic instrumentation to extract internal features that are related to malicious code and then performing classification-based detection to distinguish attacks. In addition, based on code instrumentation, we propose a new method which can de-obfuscate part of obfuscated malicious JavaScript code accurately. Ultimately, we implement a browser plug-in called MJDetector and perform evaluation on 450 real web pages. Evaluation results show that our method can detect malicious JavaScript code and de-obfuscate obfucation effectively and efficiently. Specifically, MJDetector can detect JavaScipt attacks in current web pages with high accuracy 94.76% and de-obfuscate obfuscate code of specific types with accuracy 100% whereas the base line method can only detect with accuracy 81.16% and has no capacity of de-obfuscation.
引用
收藏
页码:365 / 374
页数:10
相关论文
共 50 条
  • [1] Detection of Obfuscated Malicious Java']JavaScript Code
    Alazab, Ammar
    Khraisat, Ansam
    Alazab, Moutaz
    Singh, Sarabjot
    [J]. FUTURE INTERNET, 2022, 14 (08):
  • [2] Analysis and Identification of Malicious Java']JavaScript Code
    Fraiwan, Mohammad
    Al-Salman, Rami
    Khasawneh, Natheer
    Conrad, Stefan
    [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (01): : 1 - 11
  • [3] Detecting malicious Java']JavaScript code based on semantic analysis
    Fang, Yong
    Huang, Cheng
    Su, Yu
    Qiu, Yaoyao
    [J]. COMPUTERS & SECURITY, 2020, 93
  • [4] Detecting malicious Java']JavaScript code in Mozilla
    Hallaraker, O
    Vigna, G
    [J]. ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 85 - 94
  • [5] Polymorphic Malicious Java']JavaScript Code Detection for APT Attack Defence
    Choi, Junho
    Choi, Chang
    You, Ilsun
    Kim, Pankoo
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 369 - 383
  • [6] JACLNet:Application of adaptive code length network in Java']JavaScript malicious code detection
    Zhang, Zhining
    Wan, Liang
    Chu, Kun
    Li, Shusheng
    Wei, Haodong
    Tang, Lu
    [J]. PLOS ONE, 2022, 17 (12):
  • [7] Malicious Java']JavaScript Detection Based on Bidirectional LSTM Model
    Song, Xuyan
    Chen, Chen
    Cui, Baojiang
    Fu, Junsong
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (10):
  • [8] ScriptNet: Neural Static Analysis for Malicious Java']JavaScript Detection
    Stokes, Jack W.
    Agrawal, Rakshit
    McDonald, Geoff
    Hausknech, Matthew
    [J]. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [9] Research on Malicious Java']JavaScript Detection Technology Based on LSTM
    Fang, Yong
    Huang, Cheng
    Liu, Liang
    Xue, Min
    [J]. IEEE ACCESS, 2018, 6 : 59118 - 59125
  • [10] Malicious Java']JavaScript Detection by Features Extraction
    Canfora, Gerardo
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    [J]. E-INFORMATICA SOFTWARE ENGINEERING JOURNAL, 2014, 8 (01) : 65 - 78