Detection of shellcodes in drive-by attacks using kernel machines

被引:0
|
作者
Cherukuri, Manoj [1 ]
Mukkamala, Srinivas [2 ]
Shin, Dongwan [1 ]
机构
[1] New Mexico Inst Min & Technol, Comp Sci, Inst Complex Addit & Syst Anal, Socorro, NM 87801 USA
[2] New Mexico Inst Min & Technol, CAaNES LLC, Inst Complex Addit & Syst Anal, Socorro, NM 87801 USA
关键词
D O I
10.1007/s11416-013-0195-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a light-weight framework using kernel machines for the detection of shellcodes used in drive-by download attacks. As the shellcodes are passed in webpages as JavaScript strings, we studied the effectiveness of the proposed approach on about 9850 shellcodes and 10000 JavaScript strings collected from the wild. Our analysis shows that the trained SVMs (Support Vector Machines) classified with an accuracy of over 99%. Our evaluation of the trained SVM models with different proportions of training datasets proved to perform consistently with an average accuracy of 99.51% and the proposed static approach proved to be effective against detecting even the polymorphic shellcode variants. The performance of our approach was compared to an emulation based approach and observed that our approach performed with slightly better accuracies by consuming about 33% of the time consumed by the emulation based approach.
引用
收藏
页码:189 / 203
页数:15
相关论文
共 50 条
  • [1] Detection of Plug in Misuse Drive-By Download Attacks Using Kernel Machines
    Cherukuri, Manoj
    Mukkamala, Srinivas
    Shin, Dongwan
    2014 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2014, : 546 - 553
  • [2] Similarity Analysis of Shellcodes in Drive-by Download Attack Kits
    Cherukuri, Manoj
    Mukkamala, Srinivas
    Shin, Dongwan
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 687 - 694
  • [3] Malicious File Hash Detection and Drive-by Download Attacks
    Ghafir, Ibrahim
    Prenosil, Vaclav
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 661 - 669
  • [4] Prediction of drive-by download attacks on Twitter
    Javed, Amir
    Burnap, Pete
    Rana, Omer
    INFORMATION PROCESSING & MANAGEMENT, 2019, 56 (03) : 1133 - 1145
  • [5] Drive-By Download Attacks A Comparative Study
    Sood, Aditya K.
    Zeadally, Sherali
    IT PROFESSIONAL, 2016, 18 (05) : 18 - 25
  • [6] Drive-by leak detection
    不详
    POWER, 2003, 147 (09) : 26 - 26
  • [7] A Visual Approach to Detecting Drive-by Download Attacks
    Takada, Tetsuji
    Amako, Katsuhiro
    8TH INTERNATIONAL SYMPOSIUM ON VISUAL INFORMATION COMMUNICATION AND INTERACTION (VINCI 2015), 2015, : 162 - 163
  • [8] Drive-by damage detection in bridges using the apparent profile
    OBrien, E. J.
    Keenahan, J.
    STRUCTURAL CONTROL & HEALTH MONITORING, 2015, 22 (05): : 813 - 825
  • [9] Efficient and effective realtime prediction of drive-by download attacks
    Jayasinghe, Gaya K.
    Culpepper, J. Shane
    Bertok, Peter
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 38 : 135 - 149
  • [10] Mitigating Drive-By Download Attacks: Challenges and Open Problems
    Egele, Manuel
    Kirda, Engin
    Kruegel, Christopher
    INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 : 52 - +