AMA: Static Code Analysis of Web Page For The Detection of Malicious Scripts

被引:21
|
作者
Seshagiri, Prabhu [1 ]
Vazhayil, Anu [2 ]
Sriram, Padmamala [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Ctr Cybersecur Syst & Networks, Amritapuri Campus, Kollam, Kerala, India
[2] Amrita Vishwa Vidyapeetham, Comp Sci & Engn, Amritapuri Campus, Kollam, Kerala, India
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS | 2016年 / 93卷
关键词
Obfuscation; Static Detection; Probable Plaintext attack;
D O I
10.1016/j.procs.2016.07.291
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
JavaScript language, through its dynamic feature, provides user interactivity with websites. It also pose serious security threats to both user and website. On top of this, obfuscation is widely used to hide its malicious purpose and to evade the detection of antivirus software. Malware embedded in web pages is regularly used as part of targeted attacks. To hinder detection by antivirus scanners, the malicious code is usually obfuscated, often with encodings like hexadecimal, unicode, base64, escaped characters and rarely with substitution ciphers like Vigenere, Caesar and Atbash. The malicious iframes are injected to the websites using JavaScript and are also made hidden from the users perspective in-order to prevent detection. To defend against obfuscated malicious JavaScript code, we propose a mostly static approach called, AMA, Amrita Malware Analyzer, a framework capable of detecting the presence of malicious code through static code analysis of web page. To this end, the framework performs probable plaintext attack using strings likely contained in malicious web pages. But this approach targets only few among many possible obfuscation strategies. The evaluation based on the links provided in the Malware domain list demonstrates high level accuracy (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:768 / 773
页数:6
相关论文
共 50 条
  • [41] DOMtegrity: ensuring web page integrity against malicious browser extensions
    Toreini, Ehsan
    Mehrnezhad, Maryam
    Shahandashti, Siamak F.
    Hao, Feng
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (06) : 801 - 814
  • [42] DOMtegrity: Ensuring web page integrity against malicious browser extensions
    Toreini, Ehsan
    Mehrnezhad, Maryam
    Shahandashti, Siamak F.
    Hao, Feng
    arXiv, 2019,
  • [43] Static Analysis of File Manipulation Scripts
    Rodriguez, Rodney
    Wang, Xiaoyin
    2019 IEEE 24TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2019), 2019, : 118 - 119
  • [44] DOMtegrity: ensuring web page integrity against malicious browser extensions
    Ehsan Toreini
    Siamak F. Shahandashti
    Maryam Mehrnezhad
    Feng Hao
    International Journal of Information Security, 2019, 18 : 801 - 814
  • [45] Efficient Detection and Recovery of Malicious PowerShell Scripts Embedded into Digital Images
    Schaffhauser, Andreas
    Mazurczyk, Wojciech
    Caviglione, Luca
    Zuppelli, Marco
    Hernandez-Castro, Julio
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [46] Static detection and simulation of malicious code in a metallurgical master control station based on behavior information gain
    Hu, Tingfeng
    Engineering Intelligent Systems, 2020, 28 (01): : 15 - 22
  • [47] Using Aesthetic Measurement Application (AMA) to Measure Aesthetics of Web Page Interfaces
    Zain, Jasni Mohamad
    Tey, Mengkar
    Soon, Goh Ying
    ICNC 2008: FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 6, PROCEEDINGS, 2008, : 96 - +
  • [48] Detection technology of malicious code based on semantic
    Lu, Qingmei
    Wang, Yulin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19543 - 19555
  • [49] THE BEHAVIOR ORIENTED DETECTION OF MALICIOUS CODE OVERVIEW
    Deng, Jin-Cheng
    Liu, Dan
    Hu, Yue
    Liang, Zong-Wen
    2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 235 - 238
  • [50] Unknown Malicious Code Detection - Practical Issues
    Moskovitch, Robert
    Elovici, Yuval
    PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 145 - 152