Paper Abstract and Keywords |
Presentation |
2016-03-04 10:00
A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (YNU) ICSS2015-58 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
The malicious JavaScript is a common springboard for attackers to launch several types of network attacks, such as Drive-by-Download and malicious PDF delivery attacks. In order to elude detection of signature matching, malicious JavaScript is always packed (so-called “obfuscation”) with diversified algorithms therefore the occurrence of obfuscation is always a good pointer for potential maliciousness. In this investigation, we propose a light – weight approach for quickly filtering obfuscated JavaScript based on a novel approach of tokenizing JavaScript text at letter level and information-theoretic measure, based on the previous work in the domain of detecting obfuscated malicious code as well as the pattern analysis of natural languages. The new approach is obviously time efficient compared to existing systems since it processes much less objects while we also proved that the approach could also reach the acceptable detection accuracies. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Text Classification / Obfuscated JavaScript / Information theoretic measures / feature selection / novelty detection / / / |
Reference Info. |
IEICE Tech. Rep., vol. 115, no. 488, ICSS2015-58, pp. 65-70, March 2016. |
Paper # |
ICSS2015-58 |
Date of Issue |
2016-02-25 (ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ICSS2015-58 |
Conference Information |
Committee |
ICSS IPSJ-SPT |
Conference Date |
2016-03-03 - 2016-03-04 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Academic Center for Computing and Media Studies, Kyoto University |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Information and Communication System Security, etc. |
Paper Information |
Registration To |
ICSS |
Conference Code |
2016-03-ICSS-SPT |
Language |
English |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A fast detecting method for obfuscated malicious JavaScript based on text pattern analysis |
Sub Title (in English) |
|
Keyword(1) |
Text Classification |
Keyword(2) |
Obfuscated JavaScript |
Keyword(3) |
Information theoretic measures |
Keyword(4) |
feature selection |
Keyword(5) |
novelty detection |
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Jiawei Su |
1st Author's Affiliation |
Yokohama National University (YNU) |
2nd Author's Name |
Katsunari Yoshioka |
2nd Author's Affiliation |
Yokohama National University (YNU) |
3rd Author's Name |
Junji Shikata |
3rd Author's Affiliation |
Yokohama National University (YNU) |
4th Author's Name |
Tsutomu Matsumoto |
4th Author's Affiliation |
Yokohama National University (YNU) |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2016-03-04 10:00:00 |
Presentation Time |
30 minutes |
Registration for |
ICSS |
Paper # |
ICSS2015-58 |
Volume (vol) |
vol.115 |
Number (no) |
no.488 |
Page |
pp.65-70 |
#Pages |
6 |
Date of Issue |
2016-02-25 (ICSS) |
|