earticle

논문검색

Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis

초록

영어

Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sting is obfuscated because the shape of obfuscated strings are changed continuously. In this paper, we propose a novel methodology that can detect obfuscated strings in the malicious web pages. We extracted three metrics as rules for detecting obfuscated strings by analyzing patterns of normal and malicious JavaScript codes. They are N-gram, Entropy, and Word Size. N-gram checks how many each byte code is used in strings. Entropy checks distributed of used byte codes. Word size checks whether there is used very long string. Based on the metrics, we implemented a practical tool for our methodology and evaluated it using read malicious web pages. The experiment results showed that our methodology can detect obfuscated strings in web pages effectively.

목차

Abstract
 1. Introduction
 2. Related Work
 3. Our Methodology for Detecting Obfuscation in Malicious Web Pages
 4. Extraction of Obfuscated Strings in JavaScript
  4.1. JavaScript String Classification
  4.2. Extraction of Obfuscated String using Static Data Flow Analysis
 5. Detection of Obfuscated Strings in JavaScript Codes
  5.1. Metrics for Detecting Obfuscated Strings
  5.2. Evaluation and Experiments
 6. Conclusion and Future Work
 References

저자정보

  • YoungHan Choi The Attached Institute of ETRI
  • TaeGhyoon Kim, TaeGhyoon Kim. The Attached Institute of ETRI
  • SeokJin Choi The Attached Institute of ETRI

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.