ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. シンポジウム
  2. シンポジウムシリーズ
  3. コンピュータセキュリティシンポジウム
  4. 2021

Detecting Malicious Websites Based on JavaScript Content Analysis

https://ipsj.ixsq.nii.ac.jp/records/214498
https://ipsj.ixsq.nii.ac.jp/records/214498
3795ac35-3baa-4b00-a007-ab99c2c50750
名前 / ファイル ライセンス アクション
IPSJCSS2021098.pdf IPSJCSS2021098.pdf (1.7 MB)
Copyright (c) 2021 by the Information Processing Society of Japan
オープンアクセス
Item type Symposium(1)
公開日 2021-10-19
タイトル
タイトル Detecting Malicious Websites Based on JavaScript Content Analysis
タイトル
言語 en
タイトル Detecting Malicious Websites Based on JavaScript Content Analysis
言語
言語 eng
キーワード
主題Scheme Other
主題 Web-based Attack,Machine Learning,JavaScript,graph2vec,representation learning
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
著者所属
情報通信研究機構/神戸大学
著者所属
情報通信研究機構
著者所属
神戸大学
著者所属
神戸大学
著者所属
情報通信研究機構
著者所属
情報通信研究機構
著者所属(英)
en
National Institute of Information and Communications Technology / Graduate School of Engineering, Kobe University
著者所属(英)
en
National Institute of Information and Communications Technology
著者所属(英)
en
Graduate School of Engineering, Kobe University
著者所属(英)
en
Graduate School of Engineering, Kobe University / Center for Mathematical and Data Sciences, Kobe University
著者所属(英)
en
National Institute of Information and Communications Technology
著者所属(英)
en
National Institute of Information and Communications Technology
著者名 Muhammad, Fakhrur Rozi

× Muhammad, Fakhrur Rozi

Muhammad, Fakhrur Rozi

Search repository
班, 涛

× 班, 涛

班, 涛

Search repository
Sangwook, Kim

× Sangwook, Kim

Sangwook, Kim

Search repository
小澤, 誠一

× 小澤, 誠一

小澤, 誠一

Search repository
高橋, 健志

× 高橋, 健志

高橋, 健志

Search repository
井上, 大介

× 井上, 大介

井上, 大介

Search repository
著者名(英) Muhammad, Fakhrur Rozi

× Muhammad, Fakhrur Rozi

en Muhammad, Fakhrur Rozi

Search repository
Tao, Ban

× Tao, Ban

en Tao, Ban

Search repository
Sangwook, Kim

× Sangwook, Kim

en Sangwook, Kim

Search repository
Seiichi, Ozawa

× Seiichi, Ozawa

en Seiichi, Ozawa

Search repository
Takeshi, Takahashi

× Takeshi, Takahashi

en Takeshi, Takahashi

Search repository
Daisuke, Inoue

× Daisuke, Inoue

en Daisuke, Inoue

Search repository
論文抄録
内容記述タイプ Other
内容記述 Analyzing JavaScript contents has been a promising way to detect malicious websites. However, attackers often put malicious scripts in unreachable places and use complicated obfuscation tools to hinder the detection. Therefore, finding malicious scripts exhaustively inside the website tend to be time-consuming and ineffective in improving detection performance. To address these challenges, we introduce a novel approach to detecting malicious websites by analyzing the collective representation of the stack of JavaScripts in a website. First, we build a collective graph representation of a website by aggregating abstract syntax trees of all JavaScripts therein. Then, we use graph2vec to encode the graph into a vectorial representation. Finally, machine learning based detection is performed for identifying potentially harmful websites. Results showed that the proposed approach achieves high accuracy on a real-world dataset, outperforming prior approaches. We believe the result in this paper can open new opportunities for more effective malicious-website detection.
論文抄録(英)
内容記述タイプ Other
内容記述 Analyzing JavaScript contents has been a promising way to detect malicious websites. However, attackers often put malicious scripts in unreachable places and use complicated obfuscation tools to hinder the detection. Therefore, finding malicious scripts exhaustively inside the website tend to be time-consuming and ineffective in improving detection performance. To address these challenges, we introduce a novel approach to detecting malicious websites by analyzing the collective representation of the stack of JavaScripts in a website. First, we build a collective graph representation of a website by aggregating abstract syntax trees of all JavaScripts therein. Then, we use graph2vec to encode the graph into a vectorial representation. Finally, machine learning based detection is performed for identifying potentially harmful websites. Results showed that the proposed approach achieves high accuracy on a real-world dataset, outperforming prior approaches. We believe the result in this paper can open new opportunities for more effective malicious-website detection.
書誌情報 コンピュータセキュリティシンポジウム2021論文集

p. 727-732, 発行日 2021-10-19
出版者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-19 16:36:18.419006
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3