期刊文献+

基于Bi-LSTM模型的恶意JavaScript代码检测方法

MALICIOUS JAVASCRIPT CODE DETECTION METHOD BASED ON BI-LSTM MODEL
下载PDF
导出
摘要 传统的静态检测恶意JavaScript代码方法十分依赖于已有的恶意代码特征,无法有效提取混淆恶意代码特征,导致检测混淆恶意JavaScript代码的精确率低。针对该问题提出基于双向长短期记忆网络(Bidirectional Long Short-term Memory, Bi-LSTM)的恶意代码检测模型。通过抽象语法树将JavaScript代码转化为句法单元序列,通过Doc2Vec算法将句法单元序列用分布式向量表示,将句向量矩阵送入Bi-LSTM模型进行检测。实验结果表明,该方法对于混淆恶意JavaScript代码具有良好的检测效果且检测效率高,准确率为97.03%,召回率为97.10%。 syntax tree,and used the Doc2Vec algorithm to represent the syntactic unit sequence with distributed vectors.The sentence vector matrix was sent to the Bi-LSTM model for detection.The experimental results show that this method has good detection effect and high detection efficiency for obfuscated malicious JavaScript code,with the accuracy rate of 97.03%and the recall rate of 97.10%.
作者 纪育青 方艳红 谭顺华 王学渊 Ji Yuqing;Fang Yanhong;Tan Shunhua;Wang Xueyuan(School of Information Engineering,Southwest University of Science and Technology,Mianyang 621010,Sichuan,China;Key Laboratory of Robot Technology Used for Special Environment of Sichuan Province,Southwest University of Science and Technology,Mianyang 621010,Sichuan,China)
出处 《计算机应用与软件》 北大核心 2024年第9期357-362,共6页 Computer Applications and Software
基金 国家自然科学基金项目(61771411)。
关键词 恶意JavaScript代码检测 Bi-LSTM 深度学习 Doc2Vec Malicious JavaScript code detection Bi-LSTM Deep learning Doc2Vec
  • 相关文献

参考文献2

二级参考文献14

  • 1Hallaraker O,Vigna G.Detecting malicious javascript code in mozilla[C]//Engineering of Complex Computer Systems,2005.ICECCS2005.Proceedings.10th IEEE International Conference on.IEEE,2005:85-94.
  • 2Feinstein B,Peck D.Caffeine monkey:Automated collection,detection and analysis of malicious javascript[J].Black Hat USA,2007.
  • 3Curtsinger C,Livshits B,Zorn B G,et al.ZOZZLE:Fast and Precise InBrowser JavaS cript Malware Detection[C]//USENIX Security Symposium,2011:33-48.
  • 4Likarish P,Jung E,Jo I.Obfuscated malicious javascript detection using classification techniques[C]//Malicious and Unwanted Software(MALWARE),2009 4th International Conference on.IEEE,2009:47-54.
  • 5Cova M,Kruegel C,Vigna G.Detection and analysis of drive-by-download attacks and malicious JavaS cript code[C]//Proceedings of the19th international conference on World wide web.ACM,2010:281-290.
  • 6Choi Y H,Kim T G,Choi S J,et al.Automatic detection for javascript obfuscation attacks in web pages through string pattern analysis[M]//Future Generation Information Technology.Springer Berlin Heidelberg,2009:160-172.
  • 7Fraiwan M,Al-Salman R,Khasawneh N,et al.Analysis and Identification of Malicious JavaS cript Code[J].Information Security Journal:A Global Perspective,2012,21(1):1-11.
  • 8Xu W,Zhang F,Zhu S.The power of obfuscation techniques in malicious JavaS cript code:A measurement study[C]//Malicious and Unwanted Software(MALWARE),2012 7th International Conference on.IEEE,2012:9-16.
  • 9Alexa Top 500 Global Sites[OL].Available at:http://www.alexa.com/topsites.
  • 10VX Heavens[OL].http://www.entlux.org.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部