Obfuscated malicious javascript detection scheme using the feature based on divided URL

Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

On web application services, detecting obfuscated malicious JavaScript utilized for the attacks such as Drive-by-Download is an urgent demand. Obfuscation is a technique that modifies some elements of program codes and is used to evade the pattern matching of traditional anti-virus softwares. In particular, encode obfuscation is adopted in almost all malicious JavaScript codes as the most effective technique to hide their malicious intents. Therefore, many approaches focus on encode obfuscation to detect malicious JavaScript. However, we point out that malicious JavaScript obfuscated by the techniques except for encode obfuscation can easily evade those approaches. Motivated by the above, in this paper, we first investigated the malicious files that previous schemes cannot detect, and found that some files contain divided URL in their codes. In order to detect such JavaScript codes as malicious, we propose obfuscated malicious JavaScript detection scheme using the feature based on divided URL. We focus on the fact that the segments of URL are declared as variables and connected later. Our scheme stores variables and their contents in the dictionary type object and in the connection parts, verifies that malicious URL can be reconstructed. By the computer simulation with real dataset, we show that our scheme improves the detection effectiveness of the conventional scheme.

Original languageEnglish
Title of host publication2017 23rd Asia-Pacific Conference on Communications
Subtitle of host publicationBridging the Metropolitan and the Remote, APCC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781740523905
DOIs
Publication statusPublished - 2018 Feb 27
Event23rd Asia-Pacific Conference on Communications, APCC 2017 - Perth, Australia
Duration: 2017 Dec 112017 Dec 13

Publication series

Name2017 23rd Asia-Pacific Conference on Communications: Bridging the Metropolitan and the Remote, APCC 2017
Volume2018-January

Other

Other23rd Asia-Pacific Conference on Communications, APCC 2017
Country/TerritoryAustralia
CityPerth
Period17/12/1117/12/13

Keywords

  • Drive-by-Download attacks
  • JavaScript detection
  • Obfuscation techniques

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Signal Processing

Fingerprint

Dive into the research topics of 'Obfuscated malicious javascript detection scheme using the feature based on divided URL'. Together they form a unique fingerprint.

Cite this