期刊文献+

混淆恶意JavaScript代码的检测与反混淆方法研究 被引量:18

Detecting and De-Obfuscating Obfuscated Malicious JavaScript Code
下载PDF
导出
摘要 针对混淆恶意JavaScript代码很难被检测以及很难被反混淆的问题,深入分析了混淆JavaScript代码的外部静态行为特征和内部动态运行特征.提出一种检测混淆与反混淆方法,设计并实现了一个原型系统.系统通过静态分析检测混淆,通过动态分析进行反混淆.静态分析只使用正常行为数据进行训练,采用主成分分析(PCA)、单分类支持向量机(One Class SVM)和最近邻(K-NN)算法检测混淆.动态分析分为两个步骤:首先遍历混淆代码抽象语法树(Abstract Syntax Tree)的节点;其次根据节点类型跟踪并分析节点上的相关变量,利用相关的变量终值进行反混淆.从真实环境中收集了总数为80 574条JavaScript正常与混淆恶意代码用于测试.大量的实验结果表明,在选用主成分分析算法时,在误报率为0.1%时,系统对混淆恶意JavaScript代码的检测率能达到99.90%.与此同时,文中提出的反混淆方法对超过80%的混淆代码能进行有效反混淆. Obfuscated malicious JavaScript code is How to effectively and efficiently detect and de very difficult to be detected and to be de-obfuscated. obfuscate obfuscated malicious JavaScript code is thus an emerging and crucial issue. In order to dealing with the issue, in this paper, we analyze in-depth a big number of static outer and dynamic inner features of obfuscation, and accordingly extract effective static and dynamic features from obfuscation. A prototype system for the detection of obfuscation based on anomaly detection techniques and for the de-obfuscation based on variable analysis is designed, which combines static analysis and dynamic analysis of JavaScript codes. Static analysis is used mainly for the detection of obfuscated malicious JavaScript code while dynamic analysis is used for the de-obfuscation. In static analysis, only benign samples are used in training phase. Three machine learning algorithms are employed, namely, Principal Component Analysis (PCA), One-Class Support Vector Machine (OCSVM) and K-Nearest Neighbor (K-NN), to detect the obfuscation of malicious JavaScript code. In dynamic analysis, two steps are followed. Nodes of JavaScript Syntax Tree (AST) are first tracked and the related variable final values associated with the node types are then used to de-obfuscate. 80574 JavaScript-based pages are collected in a real network environment for validating our methods.Extensive experimental results demonstrate achieves a detection rate as 99.90% with a false positive rate as 0.1% for detecting obfuscation. Meanwhile, our de-obfuscation approach automatically de-obfuscates obfuscations with accuracy of more than 80%.
出处 《计算机学报》 EI CSCD 北大核心 2017年第7期1699-1713,共15页 Chinese Journal of Computers
基金 上海市信息安全综合管理技术研究重点实验室 教育部高校创新团队项目(IRT201206) 教育部高等学校博士学科点专项科研基金(20120009110007 20120009120010) 教育部留学回国人员科研启动基金项目(K14C300020)资助 博士点基金 中央高校基本科研业务费专项资金(2015JBM025)
关键词 混淆 WEB安全 反混淆 恶意网页 异常检测 JAVASCRIPT obfuscation Web security de-obfuscation malicious Web page anomaly detection JavaScript
  • 相关文献

参考文献2

二级参考文献13

  • 1Chih-Chung Chang,Chih-Jen Lin.LIBSVM[J]ACM Transactions on Intelligent Systems and Technology (TIST),2011(3).
  • 2Cova M, Kruegel C, Vigna G. Detection and analysisof drive-by-download attacks and malicious javascript- code[C] // Proceedings of the 19th International Con- ference on World Wide Web. New York: ACM, 2010: 2812290.
  • 3Microsoft Corporation. Microsoft security intelligence report: volumelT[R]. Redmond: Microsoft Corpora- tion, 2014.
  • 4Sophos Corporation. Security threat report 2014[R]. Burlington: Sophos Corporation, 2014.
  • 5Symantec Corporation. Internet security threat re- port: volume 19[R~. Mountain: Symantec Corpora tion, 2014.
  • 6Wang Junjie, Xue Yinxing, Liu Yang, et al. JSDC: a hybrid approach for JavaScript malware detection and classification[C] // Proceedings of the 10th ACM Symposium on Information, Computer and Communi- cations Security. New York: ACM, 2015:109 120.
  • 7Jayasinghe G K, Bertok P. Efficient and effective re- altime prediction of drive-by download attacks[J]. Journal of Network and Computer Applications, 2014, 38(2): 135-149.
  • 8Rieck K, Krueger T, Dewald A. Cujo: efficient de- tection and prevention of drive-by-download attacks I-C]//Proceedings of the 26th Annual Computer Se- curity Applications Conference. New York.. ACM, 2010: 31-39.
  • 9Zhang Haibo, Zuo Chaoshun, Guo Shanqing, et al. SafeBrowsingCloud: detecting drive-by-downloads at- tack using cloud computing environment[M~. Berlin: Springer, 2014: 292-303.
  • 10Cao Yinzhi, Pan Xiang, Chen Yan, et al. JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks[C~ // Proceedings of the 30th Annual Computer Security Applications Conference. New Orleans: ACM, 2014: 466-475.

共引文献10

同被引文献60

引证文献18

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部