Malicious Java']JavaScript Code Detection Based on Hybrid Analysis

被引:15
|
作者
He, Xincheng [1 ,2 ]
Xu, Lei [1 ,2 ]
Cha, Chunliu [1 ,2 ]
机构
[1] Nanjing Univ, Dept Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious Code Detection; Hybrid Analysis; Machine Learning; De-obfuscation; OBFUSCATION;
D O I
10.1109/APSEC.2018.00051
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
JavaScript plays an important role in web applications and services, which is used by millions of web pages in optimizing interface design, embedding dynamic texts, reading and writing HTML elements, validating form data, responding to browser events, controlling cookies and much more. However, since JavaScript is cross-platform and can be executed dynamically, it has been a major vehicle for web-based attacks. Existing solutions work by performing static analysis or monitoring program execution dynamically. However, since the heavy use of obfuscation techniques, many methods no longer apply to malicious JavaScript code detection, and it has been a huge challenge to de-obfuscate obfuscated malicious JavaScript code accurately. In this paper, we propose a hybrid analysis method combining static and dynamic analysis for detecting malicious JavaScript code that works by first conducting syntax analysis and dynamic instrumentation to extract internal features that are related to malicious code and then performing classification-based detection to distinguish attacks. In addition, based on code instrumentation, we propose a new method which can de-obfuscate part of obfuscated malicious JavaScript code accurately. Ultimately, we implement a browser plug-in called MJDetector and perform evaluation on 450 real web pages. Evaluation results show that our method can detect malicious JavaScript code and de-obfuscate obfucation effectively and efficiently. Specifically, MJDetector can detect JavaScipt attacks in current web pages with high accuracy 94.76% and de-obfuscate obfuscate code of specific types with accuracy 100% whereas the base line method can only detect with accuracy 81.16% and has no capacity of de-obfuscation.
引用
收藏
页码:365 / 374
页数:10
相关论文
共 50 条
  • [11] JS']JStrong: Malicious Java']JavaScript detection based on code semantic representation and graph neural network
    Fang, Yong
    Huang, Chaoyi
    Zeng, Minchuan
    Zhao, Zhiying
    Huang, Cheng
    [J]. COMPUTERS & SECURITY, 2022, 118
  • [12] Detection of malicious java']javascript on an imbalanced dataset
    Phung, Ngoc Minh
    Mimura, Mamoru
    [J]. INTERNET OF THINGS, 2021, 13
  • [13] Detection Approach of Malicious JavaScript Code Based on deep learning
    Zheng, Liyuan
    Zhang, Dongcheng
    Xie, Xin
    Wang, Chen
    Hou, Boyuan
    [J]. Proceedings of 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023, 2023, : 1075 - 1079
  • [14] A deep learning approach for detecting malicious Java']JavaScript code
    Wang, Yao
    Cai, Wan-dong
    Wei, Peng-cheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1520 - 1534
  • [15] Early detection of malicious behavior in javascript code
    Schütt, Kristof
    Kloft, Marius
    Bikadorov, Alexander
    Rieck, Konrad
    [J]. Proceedings of the ACM Conference on Computer and Communications Security, 2012, : 15 - 24
  • [16] JS']JSPRE: A Large-Scale Detection of Malicious Java']JavaScript Code Based on Pre-filter
    Hou, Bingnan
    Yu, Jiaping
    Liu, Bixin
    Cai, Zhiping
    [J]. CLOUD COMPUTING AND SECURITY, PT VI, 2018, 11068 : 586 - 599
  • [17] Obfuscated Malicious Java']JavaScript Detection by Machine Learning
    Pan, Jinkun
    Mao, Xiaoguang
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 805 - 810
  • [18] AN OPTIMIZATION METHOD OF JAVA']JAVASCRIPT REDUNDANT CODE ELIMINATION BASED ON HYBRID ANALYSIS TECHNIQUE
    Gao Qiong
    Li Wenmin
    [J]. 2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 300 - 305
  • [19] Java']JavaScript Malicious Codes Analysis Based on Naive Bayes Classification
    Hao, Yongle
    Liang, Hongliang
    Zhang, Daijie
    Zhao, Qian
    Cui, Baojiang
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 513 - 519
  • [20] The Power of Obfuscation Techniques in Malicious Java']JavaScript Code: A Measurement Study
    Xu, Wei
    Zhang, Fangfang
    Zhu, Sencun
    [J]. PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 9 - 16