MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) 2019
DOI: 10.1109/milcom47813.2019.9020870
|View full text |Cite
|
Sign up to set email alerts
|

ScriptNet: Neural Static Analysis for Malicious JavaScript Detection

Abstract: Malicious scripts are an important computer infection threat vector in the wild. For web-scale processing, static analysis offers substantial computing efficiencies. We propose the ScriptNet system for neural malicious JavaScript detection which is based on static analysis. We use the Convoluted Partitioning of Long Sequences (CPoLS) model, which processes Javascript files as byte sequences. Lower layers capture the sequential nature of these byte sequences while higher layers classify the resulting embedding … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 31 publications
0
10
0
Order By: Relevance
“…Finally, the fused features are taken as an input on Deep LSTM, wherein the training of Deep LSTM is done in an optimal manner considering the proposed Taylor–HHO algorithm. The developed Taylor–HHO is devised by combining the Taylor series 17 and the HHO algorithm 18 . Finally, the output of the proposed Taylor–HHO‐based Deep LSTM is categorized into two classes, namely, normal JavaScriptcode and malicious JavaScript code.…”
Section: Proposed Taylor‐hho‐based Deep Lstm For Malicious Javascript...mentioning
confidence: 99%
See 3 more Smart Citations
“…Finally, the fused features are taken as an input on Deep LSTM, wherein the training of Deep LSTM is done in an optimal manner considering the proposed Taylor–HHO algorithm. The developed Taylor–HHO is devised by combining the Taylor series 17 and the HHO algorithm 18 . Finally, the output of the proposed Taylor–HHO‐based Deep LSTM is categorized into two classes, namely, normal JavaScriptcode and malicious JavaScript code.…”
Section: Proposed Taylor‐hho‐based Deep Lstm For Malicious Javascript...mentioning
confidence: 99%
“…Stokes et al 17 devised a ScriptNet system for neural malicious JavaScript detection using static analysis. The method utilized the Convoluted Partitioning of Long Sequences (CPoLS) model that processed the JavaScript files as the sequences of bytes.…”
Section: Motivationsmentioning
confidence: 99%
See 2 more Smart Citations
“…To this end, existing work on JavaScript (de)obfuscation has mostly focused on detecting (and preventing) malicious JavaScript, often using machine learning [11,[20][21][22][23] or program analysis [7] techniques. Machine learning approaches (e.g., random forests, support vector machines) have been shown to be effective when combined with semantic features (e.g., control flow and program dependency graphs, as used by JSTAP [22]).…”
Section: Background and Related Workmentioning
confidence: 99%