Taylor-HHO algorithm: A hybrid optimization algorithm with deep long short-term for malicious Java']JavaScript detection

被引:4
作者
Alex, Scaria [1 ]
Dhiliphan Rajkumar, T. [1 ]
机构
[1] Kalasalingam Acad Res & Educ, Srivilliputhur 626128, Tamil Nadu, India
关键词
deep LSTM; feature fusion; infogain; log transformation; malicious [!text type='Java']Java[!/text]Script discovery; CODE;
D O I
10.1002/int.22584
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security of information has become a major issue due to the development of network information-based technologies. The malicious script, like, JavaScript, is a major threat to computer networks in terms of network security. Here, the JavaScript allows the programmers not only to build advanced client-side interfaces for web-based applications but also utilized for carrying out attacks that may steal the user's confidential data. In addition, the attackers can easily induce malicious JavaScript into webpages for implanting attacks, like, phishing, spreading viruses, and Trojan horses. This paper devises a novel method, namely, Taylor-Harris Hawks Optimization driven deep long short-term memory (Taylor-HHO-based Deep LSTM) for malicious JavaScript discovery. Initially, the JavaScript is subjected as input to feature extraction in which certain features, such as time of execution, function calls, condition statement, break statement, loop statements, Boolean, number of lines, and number of O(N-2) loops, are extracted. The obtained features are fed to transformation, wherein log transformation is applied for data transformation. The obtained transformed features are fused using information gain and Deep LSTM. Furthermore, the proposed Taylor-HHO-based Deep LSTM is employed for discovering malevolent JavaScript. The proposed Taylor-HHO-based Deep LSTM provided enhanced performance with the highest accuracy of 0.955, minimal FPR of 0.059, and highest TPR of 0.967.
引用
收藏
页码:7153 / 7176
页数:24
相关论文
共 31 条
[11]   Research on Malicious Java']JavaScript Detection Technology Based on LSTM [J].
Fang, Yong ;
Huang, Cheng ;
Liu, Liang ;
Xue, Min .
IEEE ACCESS, 2018, 6 :59118-59125
[12]   JS']JSTAP: A Static Pre-Filter for Malicious Java']JavaScript Detection [J].
Fass, Aurore ;
Backes, Michael ;
Stock, Ben .
35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, :257-269
[13]   JAST: Fully Syntactic Detection of Malicious (Obfuscated) Java']JavaScript [J].
Fass, Aurore ;
Krawczyk, Robert P. ;
Backes, Michael ;
Stock, Ben .
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 :303-325
[14]  
Feinstein B., 2007, BLACKHAT 07
[15]  
Gupta Shashank, 2018, Cyber Security. Proceedings of CSI 2015. Advances in Intelligent Systems and Computing (AISC 729), P459, DOI 10.1007/978-981-10-8536-9_43
[16]  
Hallaraker O, 2005, IEEE INT C ENG COMP, P85
[17]   Harris hawks optimization: Algorithm and applications [J].
Heidari, Ali Asghar ;
Mirjalili, Seyedali ;
Faris, Hossam ;
Aljarah, Ibrahim ;
Mafarja, Majdi ;
Chen, Huiling .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 :849-872
[18]   A fast learning algorithm for deep belief nets [J].
Hinton, Geoffrey E. ;
Osindero, Simon ;
Teh, Yee-Whye .
NEURAL COMPUTATION, 2006, 18 (07) :1527-1554
[19]  
Kim S, 2017, ARXIV PREPRINT ARXIV
[20]  
Largeron C., 2011, P 2011 ACM S APPL CO, P924