New deep learning method to detect code injection attacks on hybrid applications

被引:28
作者
Yan, Ruibo [1 ]
Xiao, Xi [1 ]
Hu, Guangwu [2 ]
Peng, Sancheng [3 ]
Jiang, Yong [1 ]
机构
[1] Tsinghua Univ, Grad Sch Shenzhen, Shenzhen, Peoples R China
[2] Shenzhen Inst Informat Technol, Sch Comp Sci, Shenzhen, Peoples R China
[3] Guangdong Univ Foreign Studies, Sch Informat, Guangzhou, Guangdong, Peoples R China
关键词
Code injection; Hybrid application; Abstract syntax tree; Deep learning;
D O I
10.1016/j.jss.2017.11.001
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile phones are becoming increasingly pervasive. Among them, HTML5-based hybrid applications are more and more popular because of their portability on different systems. However these applications suffer from code injection attacks. In this paper, we construct a-novel deep learning network, Hybrid Deep Learning Network (HDLN), and use it to detect these attacks. At first, based on our previous work, we extract more features from Abstract Syntax Tree (AST) of JavaScript and employ three methods to select key features. Then we get the feature vectors and train HDLN to distinguish vulnerable applications from normal ones. Finally thorough experiments are done to validate our methods. The results show our detection approach with HDLN achieves 97.55% in accuracy and 97.60% in AUC, which outperforms those with other traditional classifiers and gets higher average precision than other detection methods. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:67 / 77
页数:11
相关论文
共 38 条
  • [1] [Anonymous], IND J SCI TECHNOL
  • [2] [Anonymous], COMPUT RES REPOS
  • [3] [Anonymous], CROSS SITE SCRIPTING
  • [4] [Anonymous], 1997, Neural Computation
  • [5] [Anonymous], COMPUT RES REPOS
  • [6] [Anonymous], PATTERN RECOGN LETT
  • [7] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
  • [8] Athanasopoulos E., 2010, P 2010 USENIX C WEB, P13
  • [9] Software architectural principles in contemporary mobile software: from conception to practice
    Bagheri, Hamid
    Garcia, Joshua
    Sadeghi, Alireza
    Malek, Sam
    Medvidovic, Nenad
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 119 : 31 - 44
  • [10] Bisht P, 2008, LECT NOTES COMPUT SC, V5137, P23, DOI 10.1007/978-3-540-70542-0_2