Malicious JavaScript Detection by Features Extraction

In recent years, JavaScript-based attacks have become one of the most common and successful types of attack. Existing techniques for detecting malicious JavaScripts could fail for different reasons. Some techniques are tailored on specific kinds of attacks, and are ineffective for others. Some other...

Full description

Bibliographic Details
Main Authors: Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio
Format: Article
Language:English
Published: Wroclaw University of Science and Technology 2015-06-01
Series:e-Informatica Software Engineering Journal
Subjects:
Online Access:http://www.e-informatyka.pl/attach/e-Informatica_-_Volume_8/eInformatica2014Art5.pdf
_version_ 1819047789165805568
author Gerardo Canfora
Francesco Mercaldo
Corrado Aaron Visaggio
author_facet Gerardo Canfora
Francesco Mercaldo
Corrado Aaron Visaggio
author_sort Gerardo Canfora
collection DOAJ
description In recent years, JavaScript-based attacks have become one of the most common and successful types of attack. Existing techniques for detecting malicious JavaScripts could fail for different reasons. Some techniques are tailored on specific kinds of attacks, and are ineffective for others. Some other techniques require costly computational resources to be implemented. Other techniques could be circumvented with evasion methods. This paper proposes a method for detecting malicious JavaScript code based on five features that capture different characteristics of a script: execution time, external referenced domains and calls to JavaScript functions. Mixing different types of features could result in a more effective detection technique, and overcome the limitations of existing tools created for identifying malicious JavaScript. The experimentation carried out suggests that a combination of these features is able to successfully detect malicious JavaScript code (in the best cases we obtained a precision of 0.979 and a recall of 0.978).
first_indexed 2024-12-21T11:05:56Z
format Article
id doaj.art-ffb1293311cf45bfb4865f519bf6927b
institution Directory Open Access Journal
issn 1897-7979
2084-4840
language English
last_indexed 2024-12-21T11:05:56Z
publishDate 2015-06-01
publisher Wroclaw University of Science and Technology
record_format Article
series e-Informatica Software Engineering Journal
spelling doaj.art-ffb1293311cf45bfb4865f519bf6927b2022-12-21T19:06:13ZengWroclaw University of Science and Technologye-Informatica Software Engineering Journal1897-79792084-48402015-06-01816578Malicious JavaScript Detection by Features ExtractionGerardo Canfora0Francesco Mercaldo1Corrado Aaron Visaggio2Department of Engineering, University of SannioDepartment of Engineering, University of SannioDepartment of Engineering, University of SannioIn recent years, JavaScript-based attacks have become one of the most common and successful types of attack. Existing techniques for detecting malicious JavaScripts could fail for different reasons. Some techniques are tailored on specific kinds of attacks, and are ineffective for others. Some other techniques require costly computational resources to be implemented. Other techniques could be circumvented with evasion methods. This paper proposes a method for detecting malicious JavaScript code based on five features that capture different characteristics of a script: execution time, external referenced domains and calls to JavaScript functions. Mixing different types of features could result in a more effective detection technique, and overcome the limitations of existing tools created for identifying malicious JavaScript. The experimentation carried out suggests that a combination of these features is able to successfully detect malicious JavaScript code (in the best cases we obtained a precision of 0.979 and a recall of 0.978).http://www.e-informatyka.pl/attach/e-Informatica_-_Volume_8/eInformatica2014Art5.pdfmalicious JavaScripts
spellingShingle Gerardo Canfora
Francesco Mercaldo
Corrado Aaron Visaggio
Malicious JavaScript Detection by Features Extraction
e-Informatica Software Engineering Journal
malicious JavaScripts
title Malicious JavaScript Detection by Features Extraction
title_full Malicious JavaScript Detection by Features Extraction
title_fullStr Malicious JavaScript Detection by Features Extraction
title_full_unstemmed Malicious JavaScript Detection by Features Extraction
title_short Malicious JavaScript Detection by Features Extraction
title_sort malicious javascript detection by features extraction
topic malicious JavaScripts
url http://www.e-informatyka.pl/attach/e-Informatica_-_Volume_8/eInformatica2014Art5.pdf
work_keys_str_mv AT gerardocanfora maliciousjavascriptdetectionbyfeaturesextraction
AT francescomercaldo maliciousjavascriptdetectionbyfeaturesextraction
AT corradoaaronvisaggio maliciousjavascriptdetectionbyfeaturesextraction