Skip to main content
Top

2018 | OriginalPaper | Chapter

JSPRE: A Large-Scale Detection of Malicious JavaScript Code Based on Pre-filter

Authors : Bingnan Hou, Jiaping Yu, Bixin Liu, Zhiping Cai

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Malicious web pages that use drive-by-download attacks or social engineering technique have become a popular means for compromising hosts on the Internet. To search for malicious web pages, researchers have developed a number of systems that analyze web pages for the presence of malicious code. Most of these systems use dynamic analysis. That is, the tools are quite precise, the analysis process is costly. Therefore, performing this analysis on a large-scale of web pages can be prohibitive. In this paper, we present JSPRE, an approach to search the web more efficiently for pages that are likely malicious. JSPRE proposes a malicious page collection algorithm based on guided crawling, which starts from an initial URLs of know malicious web pages. In the meanwhile, JSPRE uses static analysis techniques to quickly examine a web page for malicious content. We have implemented our approach, and we evaluated it on a large-scale dataset. The results show that JSPRE is able to identify malicious web pages more efficiently when compared to crawler-based approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Shindo, Y., et al.: Lightweight approach to detect drive-by download attacks based on file type transition. ACM (2014) Shindo, Y., et al.: Lightweight approach to detect drive-by download attacks based on file type transition. ACM (2014)
3.
go back to reference Jensen, S.H., Madsen, M., Moller, A.: Modeling the HTML DOM and browser API in static analysis of JavaScript web applications. ACM (2011) Jensen, S.H., Madsen, M., Moller, A.: Modeling the HTML DOM and browser API in static analysis of JavaScript web applications. ACM (2011)
4.
go back to reference Thinh, T.N., et al.: Memory-efficient signature matching for ClamAV on FPGA (2014) Thinh, T.N., et al.: Memory-efficient signature matching for ClamAV on FPGA (2014)
5.
go back to reference Flores, R.: How Blackhat SEO became big. Technical report, Trend Micro (2010) Flores, R.: How Blackhat SEO became big. Technical report, Trend Micro (2010)
6.
go back to reference Spitzner, L.: The honeynet project: trapping the hackers. IEEE Secur. Priv. 1(2), 15–23 (2003)CrossRef Spitzner, L.: The honeynet project: trapping the hackers. IEEE Secur. Priv. 1(2), 15–23 (2003)CrossRef
7.
go back to reference Gang, Z., Peng, W., Xin, W.: The detection method for two-dimensional barcode malicious URL based on the decision tree. Inf. Secur. Technol. 2, 12 (2014) Gang, Z., Peng, W., Xin, W.: The detection method for two-dimensional barcode malicious URL based on the decision tree. Inf. Secur. Technol. 2, 12 (2014)
8.
go back to reference Choi, J., et al.: Efficient malicious code detection using n-gram analysis and SVM. IEEE (2011) Choi, J., et al.: Efficient malicious code detection using n-gram analysis and SVM. IEEE (2011)
9.
go back to reference Wang, Y., et al.: Automated web patrol with strider honeymonkeys (2006) Wang, Y., et al.: Automated web patrol with strider honeymonkeys (2006)
10.
go back to reference Kaur, R., Singh, M.: Efficient hybrid technique for detecting zero-day polymorphic worms. IEEE (2014) Kaur, R., Singh, M.: Efficient hybrid technique for detecting zero-day polymorphic worms. IEEE (2014)
11.
go back to reference Moshchuk, A., et al.: A crawler-based study of spyware in the web (2006) Moshchuk, A., et al.: A crawler-based study of spyware in the web (2006)
12.
go back to reference Seifert, C., Steenson, R.: Capture-honeypot client (capture-HPC) (2006) Seifert, C., Steenson, R.: Capture-honeypot client (capture-HPC) (2006)
13.
go back to reference Nazario, J.: PhoneyC: a virtual client honeypot. USENIX Association (2009) Nazario, J.: PhoneyC: a virtual client honeypot. USENIX Association (2009)
14.
go back to reference Keane, J.K.: Using the Google safe browsing API from PHP. Mad Irish, 7 August 2009 Keane, J.K.: Using the Google safe browsing API from PHP. Mad Irish, 7 August 2009
15.
go back to reference Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)CrossRef Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)CrossRef
16.
go back to reference Seifert, C., Welch, I., Komisarczuk, P.: Honeyc-the low-interaction client honeypot. In: Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton (2007) Seifert, C., Welch, I., Komisarczuk, P.: Honeyc-the low-interaction client honeypot. In: Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton (2007)
17.
go back to reference Friedrichs, O., Huger, A., O’Donnell, A.J.: Method and apparatus for detecting malicious software using machine learning techniques. US Patent (2015) Friedrichs, O., Huger, A., O’Donnell, A.J.: Method and apparatus for detecting malicious software using machine learning techniques. US Patent (2015)
18.
go back to reference Feinstein, B., Peck, D., Secureworks, Inc.: Caffeine monkey: automated collection, detection and analysis of malicious JavaScript. Black Hat USA (2007) Feinstein, B., Peck, D., Secureworks, Inc.: Caffeine monkey: automated collection, detection and analysis of malicious JavaScript. Black Hat USA (2007)
19.
go back to reference Rieck, K., Krueger, T., Dewald, A.: Cujo: efficient detection and prevention of drive-by-download attacks. ACM (2010) Rieck, K., Krueger, T., Dewald, A.: Cujo: efficient detection and prevention of drive-by-download attacks. ACM (2010)
20.
go back to reference Curtsinger, C., et al.: ZOZZLE: fast and precise in-browser JavaScript malware detection (2011) Curtsinger, C., et al.: ZOZZLE: fast and precise in-browser JavaScript malware detection (2011)
22.
go back to reference Long, J.: Google Hacking for Penetration Testers. Syngress (2011) Long, J.: Google Hacking for Penetration Testers. Syngress (2011)
24.
go back to reference Hartstein, B.: Jsunpack: an automatic JavaScript unpacker (2009) Hartstein, B.: Jsunpack: an automatic JavaScript unpacker (2009)
25.
go back to reference Page, L., et al.: The PageRank citation ranking: bringing order to the web (1999) Page, L., et al.: The PageRank citation ranking: bringing order to the web (1999)
26.
go back to reference Das Sarma, A., et al.: Fast distributed PageRank computation. Theor. Comput. Sci. (2014) Das Sarma, A., et al.: Fast distributed PageRank computation. Theor. Comput. Sci. (2014)
28.
go back to reference Daniel, M., Honoroff, J., Miller, C.: Engineering heap overflow exploits with JavaScript. WOOT 8, 1–6 (2008) Daniel, M., Honoroff, J., Miller, C.: Engineering heap overflow exploits with JavaScript. WOOT 8, 1–6 (2008)
29.
go back to reference Hallaraker, O., Vigna, G.: Detecting malicious JavaScript code in Mozilla. IEEE (2005) Hallaraker, O., Vigna, G.: Detecting malicious JavaScript code in Mozilla. IEEE (2005)
30.
go back to reference Shkapenyuk, V., Suel, T.: Design and implementation of a high-performance distributed web crawler. IEEE (2002) Shkapenyuk, V., Suel, T.: Design and implementation of a high-performance distributed web crawler. IEEE (2002)
Metadata
Title
JSPRE: A Large-Scale Detection of Malicious JavaScript Code Based on Pre-filter
Authors
Bingnan Hou
Jiaping Yu
Bixin Liu
Zhiping Cai
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00021-9_52

Premium Partner