Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction

被引:0
作者
AL-Taharwa, Ismail Adel [1 ]
Lee, Hahn-Ming [2 ,3 ]
Jeng, Albert B. [2 ,4 ]
Ho, Cheng-Seen [2 ,5 ]
Wu, Kuo-Ping [2 ]
Chen, Shyi-Ming [2 ]
机构
[1] Univ Jordan, Dept Comp Informat Syst, Aqaba, Jordan
[2] Natl Taiwan Univ Sci & Technol, Dept CSIE, Taipei, Taiwan
[3] Acad Sinica, Inst Informat Sci, Taipei, Taiwan
[4] Jinwen Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
[5] Tungnan Univ, Dept Informat Technol, Taipei, Taiwan
来源
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 | 2015年
关键词
!text type='Java']Java[!/text]Script; Drive-by download; Obfuscation; AST; SVM; Naive bayes;
D O I
10.1109/Trustcom-2015.392
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Drive-by downloads continue to be the basis for many kinds of large-scale web attacks. The detection of Drive-by downloads and heap spraying attacks has been receiving serious research attention. The appearance of complex obfuscation patterns make the two primary challenges preventing the development of large-scale, real-time detectors of drive-by downloads become contradictory. On one hand, fabrication of disguised transformations (massively and heavily obfuscated scripts) thwarts capabilities of static analysis. On the other hand, dynamic analysis incurs excessive overhead along with other limitations. To ameliorate this situation, we propose Drive-by Disclosure, a novel complementary solution to bridge the gap between dynamic and static approaches. Driveby Disclosure leverages availability of AST representation to predict script's latent behaviors statically. This approach facilitates distinction between scripting practices of drive-by downloads and disguised transformations. Subsequently, in order to reliably detect drive-by downloads, dynamic analysis will only be applied to the scripts that are identified as disguised. Compared to the state-of-the-art solutions, Driveby Disclosure minimizes analysis overhead of JSAND to less than 24%. Also, it improves JSAND's detection rate by more than 29 absolute percentage points. Further, the combination of JSAND and Drive-by Disclosure attains two times better accuracy than Cujo.
引用
收藏
页码:334 / 343
页数:10
相关论文
共 28 条
  • [1] Al-Taharwa I. A., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P1370, DOI 10.1109/TrustCom.2012.235
  • [2] Al-Taharwa I. A., 2011, Proceedings of the 2011 13th International Conference on Advanced Communication Technology (ICACT). Smart Service Innovation through Mobile Interactivity, P787
  • [3] Alexandros K., 2013, USENIX SECURITY
  • [4] [Anonymous], 2007 USENIX ANN TECH
  • [5] [Anonymous], 2011, P 20 INT C WORLD WID
  • [6] A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude
    Blanc, Gregory
    Kadobayashi, Youki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2159 - 2166
  • [7] Chellapilla K., 2007, P 3 INT WORKSH ADV I, P81, DOI [10.1145/1244408.1244423, DOI 10.1145/1244408.1244423]
  • [8] Cova M, 2010, P 19 INT C WORLD WID, P281, DOI DOI 10.1145/1772690.1772720
  • [9] Curtsinger C., 2011, P 20 USENIX C SEC SE
  • [10] Dewald Andreas., 2010, Proceedings of the 2010 Symposium on Applied Computing (SAC), P1859