Taylor-HHO algorithm: A hybrid optimization algorithm with deep long short-term for malicious Java']JavaScript detection

被引:4
作者
Alex, Scaria [1 ]
Dhiliphan Rajkumar, T. [1 ]
机构
[1] Kalasalingam Acad Res & Educ, Srivilliputhur 626128, Tamil Nadu, India
关键词
deep LSTM; feature fusion; infogain; log transformation; malicious [!text type='Java']Java[!/text]Script discovery; CODE;
D O I
10.1002/int.22584
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security of information has become a major issue due to the development of network information-based technologies. The malicious script, like, JavaScript, is a major threat to computer networks in terms of network security. Here, the JavaScript allows the programmers not only to build advanced client-side interfaces for web-based applications but also utilized for carrying out attacks that may steal the user's confidential data. In addition, the attackers can easily induce malicious JavaScript into webpages for implanting attacks, like, phishing, spreading viruses, and Trojan horses. This paper devises a novel method, namely, Taylor-Harris Hawks Optimization driven deep long short-term memory (Taylor-HHO-based Deep LSTM) for malicious JavaScript discovery. Initially, the JavaScript is subjected as input to feature extraction in which certain features, such as time of execution, function calls, condition statement, break statement, loop statements, Boolean, number of lines, and number of O(N-2) loops, are extracted. The obtained features are fed to transformation, wherein log transformation is applied for data transformation. The obtained transformed features are fused using information gain and Deep LSTM. Furthermore, the proposed Taylor-HHO-based Deep LSTM is employed for discovering malevolent JavaScript. The proposed Taylor-HHO-based Deep LSTM provided enhanced performance with the highest accuracy of 0.955, minimal FPR of 0.059, and highest TPR of 0.967.
引用
收藏
页码:7153 / 7176
页数:24
相关论文
共 31 条
[1]   JS']JSDES - An Automated De-Obfuscation System for Malicious Java']JavaScript [J].
AbdelKhalek, Moataz ;
Shosha, Ahmed .
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
[2]  
Anand, 2020, J NETW COMMUN SYST, V3, P9, DOI DOI 10.46253/JNACS.V3I4.A2
[3]   Spider Monkey Optimization algorithm for numerical optimization [J].
Bansal, Jagdish Chand ;
Sharma, Harish ;
Jadon, Shimpi Singh ;
Clerc, Maurice .
MEMETIC COMPUTING, 2014, 6 (01) :31-47
[4]   HMPA: an innovative hybrid multi-population algorithm based on artificial ecosystem-based and Harris Hawks optimization algorithms for engineering problems [J].
Barshandeh, Saeid ;
Piri, Farhad ;
Sangani, Simin Rasooli .
ENGINEERING WITH COMPUTERS, 2022, 38 (02) :1581-1625
[5]   A new hybrid chaotic atom search optimization based on tree-seed algorithm and Levy flight for solving optimization problems [J].
Barshandeh, Saeid ;
Haghzadeh, Maryam .
ENGINEERING WITH COMPUTERS, 2021, 37 (04) :3079-3122
[6]  
Bhaladhare P. R., 2014, Advances in Computer Engineering, V2014, P1, DOI DOI 10.1155/2014/396529
[7]  
Corona Igino., 2014, P 2014 WORKSHOP ARTI, P47, DOI [DOI 10.1145/2666652.2666657, 10.1145/2666652.2666657]
[8]  
Dineva K., 2018, INT MULTIDISCIPLINAR, P35, DOI DOI 10.5593/SGEM2018/6.2/S25.005
[9]  
Dineva K., 2018, YB TELECOMMUNICATION, V5, P1
[10]   Detecting malicious Java']JavaScript code based on semantic analysis [J].
Fang, Yong ;
Huang, Cheng ;
Su, Yu ;
Qiu, Yaoyao .
COMPUTERS & SECURITY, 2020, 93