AMA: Static Code Analysis of Web Page For The Detection of Malicious Scripts

被引:21
|
作者
Seshagiri, Prabhu [1 ]
Vazhayil, Anu [2 ]
Sriram, Padmamala [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Ctr Cybersecur Syst & Networks, Amritapuri Campus, Kollam, Kerala, India
[2] Amrita Vishwa Vidyapeetham, Comp Sci & Engn, Amritapuri Campus, Kollam, Kerala, India
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS | 2016年 / 93卷
关键词
Obfuscation; Static Detection; Probable Plaintext attack;
D O I
10.1016/j.procs.2016.07.291
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
JavaScript language, through its dynamic feature, provides user interactivity with websites. It also pose serious security threats to both user and website. On top of this, obfuscation is widely used to hide its malicious purpose and to evade the detection of antivirus software. Malware embedded in web pages is regularly used as part of targeted attacks. To hinder detection by antivirus scanners, the malicious code is usually obfuscated, often with encodings like hexadecimal, unicode, base64, escaped characters and rarely with substitution ciphers like Vigenere, Caesar and Atbash. The malicious iframes are injected to the websites using JavaScript and are also made hidden from the users perspective in-order to prevent detection. To defend against obfuscated malicious JavaScript code, we propose a mostly static approach called, AMA, Amrita Malware Analyzer, a framework capable of detecting the presence of malicious code through static code analysis of web page. To this end, the framework performs probable plaintext attack using strings likely contained in malicious web pages. But this approach targets only few among many possible obfuscation strategies. The evaluation based on the links provided in the Malware domain list demonstrates high level accuracy (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:768 / 773
页数:6
相关论文
共 50 条
  • [21] Analysis and Detection of Malicious Data Exfiltration in Web Traffic
    Al-Bataineh, Areej
    White, Gregory
    PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 26 - 31
  • [22] Effective Analysis, Characterization, and Detection of Malicious Web Pages
    Eshete, Birhanu
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 355 - 359
  • [23] A Malicious Code Static Detection Framework Based on Multi-Feature Ensemble Learning
    Yang W.
    Gao M.
    Jiang T.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (05): : 1021 - 1034
  • [24] Feature representation and selection in malicious code detection methods based on static system calls
    Ding Yuxin
    Yuan Xuebing
    Zhou Di
    Dong Li
    An Zhanchao
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 514 - 524
  • [25] A static Android malicious code detection method based on multi-source fusion
    Du, Yao
    Wang, Xiaoqing
    Wang, Junfeng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3238 - 3246
  • [26] Identification of Malicious Web Pages with Static Heuristics
    Seifert, Christian
    Welch, Ian
    Komisarczuk, Peter
    ATNAC: 2008 AUSTRALASIAN TELECOMMUNICATION NETWOKS AND APPLICATIONS CONFERENCE, 2008, : 91 - 96
  • [27] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374
  • [28] Malicious Code Detection: Run Trace Output Analysis by LSTM
    Acarturk, Cengiz
    Sirlanci, Melih
    Balikcioglu, Pinar Gurkan
    Demirci, Deniz
    Sahin, Nazenin
    Kucuk, Ozge Acar
    IEEE ACCESS, 2021, 9 : 9625 - 9635
  • [29] ScriptNet: Neural Static Analysis for Malicious Java']JavaScript Detection
    Stokes, Jack W.
    Agrawal, Rakshit
    McDonald, Geoff
    Hausknech, Matthew
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [30] Malicious Code Detection Based on Code Semantic Features
    Zhang, Yu
    Li, Binglong
    IEEE ACCESS, 2020, 8 : 176728 - 176737