Detecting Browser Drive-By Exploits in Images Using Deep Learning

被引:3
作者
Iglesias, Patricia [1 ]
Sicilia, Miguel-Angel [1 ]
Garcia-Barriocanal, Elena [1 ]
机构
[1] Univ Alcala, Comp Sci Dept, Madrid 28805, Spain
关键词
steganography; steganalysis; polyglots; neural networks; deep learning; NETWORK; STEGANALYSIS;
D O I
10.3390/electronics12030473
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography is the set of techniques aiming to hide information in messages as images. Recently, stenographic techniques have been combined with polyglot attacks to deliver exploits in Web browsers. Machine learning approaches have been proposed in previous works as a solution for detecting stenography in images, but the specifics of hiding exploit code have not been systematically addressed to date. This paper proposes the use of deep learning methods for such detection, accounting for the specifics of the situation in which the images and the malicious content are delivered using Spatial and Frequency Domain Steganography algorithms. The methods were evaluated by using benchmark image databases with collections of JavaScript exploits, for different density levels and steganographic techniques in images. A convolutional neural network was built to classify the infected images with a validation accuracy around 98.61% and a validation AUC score of 99.75%.
引用
收藏
页数:13
相关论文
共 39 条
[1]   ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis [J].
Li, Bin ;
Wei, Weihang ;
Ferreira, Anselmo ;
Tan, Shunquan .
IEEE Signal Processing Letters, 2018, 25 (05) :650-654
[2]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[3]  
Chaumont M, 2019, ARXIV PREPRINT ARXIV
[4]   A Method of Detecting Storage Based Network Steganography Using Machine Learning [J].
Cho, D. X. ;
Thuong, D. T. H. ;
Dung, N. K. .
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY [ICICT-2019], 2019, 154 :543-548
[5]  
ENISA, THREAT LANDSC 2020 C
[6]  
gdatasoftware.com, BEBLOH WELL KNOWN BA
[7]  
github.com, COLLECTION JAVASCRIP
[8]  
ics-cert.kaspersky.com, STEGANOGRAPHY ATTACK
[9]   A High Capacity Steganographic Method Based on Quantization Table Modification and F5 Algorithm [J].
Jiang, Cuiling ;
Pang, Yilin ;
Xiong, Shun .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2014, 33 (05) :1611-1626
[10]   Review on optical image hiding and watermarking techniques [J].
Jiao, Shuming ;
Zhou, Changyuan ;
Shi, Yishi ;
Zou, Wenbin ;
Li, Xia .
OPTICS AND LASER TECHNOLOGY, 2019, 109 :370-380