Defending Malicious Script Attacks Using Machine Learning Classifiers

被引:29
作者
Khan, Nayeem [1 ]
Abdullah, Johari [1 ]
Khan, Adnan Shahid [1 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Dept Comp Syst & Commun Technol, Kota Samarahan 94300, Sarawak, Malaysia
关键词
D O I
10.1155/2017/5360472
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The web application has become a primary target for cyber criminals by injecting malware especially JavaScript to perform malicious activities for impersonation. Thus, it becomes an imperative to detect such malicious code in real time before any malicious activity is performed. This study proposes an efficient method of detecting previously unknown malicious java scripts using an interceptor at the client side by classifying the key features of the malicious code. Feature subset was obtained by using wrapper method for dimensionality reduction. Supervised machine learning classifiers were used on the dataset for achieving high accuracy. Experimental results show that our method can efficiently classify malicious code from benign code with promising results.
引用
收藏
页数:9
相关论文
共 29 条
  • [1] Detecting Fake Medical Web Sites Using Recursive Trust Labeling
    Abbasi, Ahmed
    Zahedi, Fatemeh Mariam
    Kaza, Siddharth
    [J]. ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2012, 30 (04)
  • [2] Ahmed F., 2009, P 2 ACM WORKSH SEC A
  • [3] JS']JSOD: Java']JavaScript obfuscation detector
    AL-Taharwa, Ismail Adel
    Lee, Hahn-Ming
    Jeng, Albert B.
    Wu, Kuo-Ping
    Ho, Cheng-Seen
    Chen, Shyi-Ming
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1092 - 1107
  • [4] Profiling and classifying the behavior of malicious codes
    Alazab, Mamoun
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 100 : 91 - 102
  • [5] AN INTRODUCTION TO KERNEL AND NEAREST-NEIGHBOR NONPARAMETRIC REGRESSION
    ALTMAN, NS
    [J]. AMERICAN STATISTICIAN, 1992, 46 (03) : 175 - 185
  • [6] [Anonymous], YET ANOTHER COMPILER
  • [7] [Anonymous], 2015, P 9 INT C IT AS CITA
  • [8] [Anonymous], 2012, Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec'12, DOI [10.1145/2381896.2381901, DOI 10.1145/2381896.2381901]
  • [9] [Anonymous], 1963, Automation and Remote Control
  • [10] Boser B. E., 1992, Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory, P144, DOI 10.1145/130385.130401