Please use this identifier to cite or link to this item: https://doi.org/10.21256/zhaw-3848
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAebersold, Simon-
dc.contributor.authorKryszczuk, Krzysztof-
dc.contributor.authorPaganoni, Sergio-
dc.contributor.authorTellenbach, Bernhard-
dc.contributor.authorTrowbridge, Timothy-
dc.date.accessioned2018-07-09T12:20:16Z-
dc.date.available2018-07-09T12:20:16Z-
dc.date.issued2016-
dc.identifier.isbn978-1-61208-475-6de_CH
dc.identifier.issn2308-3980de_CH
dc.identifier.urihttps://www.thinkmind.org/index.php?view=article&articleid=icimp_2016_1_20_30023de_CH
dc.identifier.urihttps://digitalcollection.zhaw.ch/handle/11475/7717-
dc.description.abstractJavaScript is a common attack vector for attacking browsers, browser plug-ins, email clients and other JavaScript enabled applications. Malicious JavaScripts redirect victims to exploit kits, probe for known vulnerabilities to select a fitting exploit or manipulate the Document Object Model (DOM) of a web page in a harmful way. Malicious JavaScript code is often obfuscated in order to make it hard to detect using signature-based approaches. Since the only other reason to use obfuscation is to protect intellectual property, the share of scripts which are both benign and obfuscated is quite low, and could easily be captured with a whitelist. A detector that can reliably detect obfuscated JavaScripts would therefore be a valuable tool in fighting malicious JavaScripts. In this paper, we present a method for automatic detection of obfuscated JavaScript using a machine-learning approach. Using a dataset of regular, minified and obfuscated samples from a content delivery network and the Alexa top 500 websites, we show that it is possible to distinguish between obfuscated and non-obfuscated scripts with precision and recall around 99%. We also introduce a novel set of features, which help detect obfuscation in JavaScripts. Our results presented here shed additional light on the problem of distinguishing between malicious and benign scripts.de_CH
dc.language.isoende_CH
dc.publisherCurran Associatesde_CH
dc.rightsNot specifiedde_CH
dc.subjectObfuscated JavaScriptde_CH
dc.subjectDetectionde_CH
dc.subjectMalicious JavaScriptde_CH
dc.subjectMachine learningde_CH
dc.subject.ddc006: Spezielle Computerverfahrende_CH
dc.titleDetecting obfuscated JavaScripts using machine learningde_CH
dc.typeKonferenz: Paperde_CH
dcterms.typeTextde_CH
zhaw.departementSchool of Engineeringde_CH
zhaw.organisationalunitInstitut für Informatik (InIT)de_CH
zhaw.publisher.placeRed Hookde_CH
dc.identifier.doi10.21256/zhaw-3848-
zhaw.conference.detailsICIMP 2016 the Eleventh International Conference on Internet Monitoring and Protection, Valencia, Spain, 22-26 May 2016de_CH
zhaw.funding.euNode_CH
zhaw.originated.zhawYesde_CH
zhaw.pages.end17de_CH
zhaw.pages.start11de_CH
zhaw.publication.statuspublishedVersionde_CH
zhaw.volume1de_CH
zhaw.publication.reviewPeer review (Publikation)de_CH
zhaw.title.proceedingsICIMP 2016 the Eleventh International Conference on Internet Monitoring and Protection : May 22-26, 2016, Valencia, Spainde_CH
zhaw.webfeedInformation Securityde_CH
Appears in collections:Publikationen School of Engineering

Files in This Item:
File Description SizeFormat 
sec_v9_n34_2016_10.pdf324.04 kBAdobe PDFThumbnail
View/Open
Show simple item record
Aebersold, S., Kryszczuk, K., Paganoni, S., Tellenbach, B., & Trowbridge, T. (2016). Detecting obfuscated JavaScripts using machine learning [Conference paper]. ICIMP 2016 the Eleventh International Conference on Internet Monitoring and Protection : May 22-26, 2016, Valencia, Spain, 1, 11–17. https://doi.org/10.21256/zhaw-3848
Aebersold, S. et al. (2016) ‘Detecting obfuscated JavaScripts using machine learning’, in ICIMP 2016 the Eleventh International Conference on Internet Monitoring and Protection : May 22-26, 2016, Valencia, Spain. Red Hook: Curran Associates, pp. 11–17. Available at: https://doi.org/10.21256/zhaw-3848.
S. Aebersold, K. Kryszczuk, S. Paganoni, B. Tellenbach, and T. Trowbridge, “Detecting obfuscated JavaScripts using machine learning,” in ICIMP 2016 the Eleventh International Conference on Internet Monitoring and Protection : May 22-26, 2016, Valencia, Spain, 2016, vol. 1, pp. 11–17. doi: 10.21256/zhaw-3848.
AEBERSOLD, Simon, Krzysztof KRYSZCZUK, Sergio PAGANONI, Bernhard TELLENBACH und Timothy TROWBRIDGE, 2016. Detecting obfuscated JavaScripts using machine learning. In: ICIMP 2016 the Eleventh International Conference on Internet Monitoring and Protection : May 22-26, 2016, Valencia, Spain [online]. Conference paper. Red Hook: Curran Associates. 2016. S. 11–17. ISBN 978-1-61208-475-6. Verfügbar unter: https://www.thinkmind.org/index.php?view=article&articleid=icimp_2016_1_20_30023
Aebersold, Simon, Krzysztof Kryszczuk, Sergio Paganoni, Bernhard Tellenbach, and Timothy Trowbridge. 2016. “Detecting Obfuscated JavaScripts Using Machine Learning.” Conference paper. In ICIMP 2016 the Eleventh International Conference on Internet Monitoring and Protection : May 22-26, 2016, Valencia, Spain, 1:11–17. Red Hook: Curran Associates. https://doi.org/10.21256/zhaw-3848.
Aebersold, Simon, et al. “Detecting Obfuscated JavaScripts Using Machine Learning.” ICIMP 2016 the Eleventh International Conference on Internet Monitoring and Protection : May 22-26, 2016, Valencia, Spain, vol. 1, Curran Associates, 2016, pp. 11–17, https://doi.org/10.21256/zhaw-3848.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.