期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
LSTM RNN:detecting exploit kits using redirection chain sequences 被引量:4
1
作者 Jonah Burgess Philip O’Kane +1 位作者 Sakir Sezer domhnall carlin 《Cybersecurity》 EI CSCD 2021年第1期386-400,共15页
While consumers use the web to perform routine activities,they are under the constant threat of attack from malicious websites.Even when visiting‘trusted’sites,there is always a risk that site is compromised,and,hos... While consumers use the web to perform routine activities,they are under the constant threat of attack from malicious websites.Even when visiting‘trusted’sites,there is always a risk that site is compromised,and,hosting a malicious script.In this scenario,the injected script would typically force the victim’s browser to undergo a series of redirects before reaching an attacker-controlled domain,which,delivers the actual malware.Although these malicious redirection chains aim to frustrate detection and analysis efforts,they could be used to help identify web-based attacks.Building upon previous work,this paper presents the first known application of a Long Short-Term Memory(LSTM)network to detect Exploit Kit(EK)traffic,utilising the structure of HTTP redirects.Samples are processed as sequences,where each timestep represents a redirect and contains a unique combination of 48 features.The experiment is conducted using a ground-truth dataset of 1279 EK and 5910 benign redirection chains.Hyper-parameters are tuned via K-fold cross-validation(5f-CV),with the optimal configuration achieving an F1 score of 0.9878 against the unseen test set.Furthermore,we compare the results of isolated feature categories to assess their importance. 展开更多
关键词 Exploit kits MALWARE LSTM
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部