Detailed Information

Cited 1 time in webofscience Cited 1 time in scopus
Metadata Downloads

Lightweight Detection Method of Obfuscated Landing Sites Based on the AST Structure and Tokens

Authors
Han, KyungHyunHwang, Seong Oun
Issue Date
Sep-2020
Publisher
MDPI
Keywords
malicious JavaScript; abstract syntax tree; static analysis; obfuscation detection; redirection detection
Citation
APPLIED SCIENCES-BASEL, v.10, no.17
Journal Title
APPLIED SCIENCES-BASEL
Volume
10
Number
17
URI
https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/11572
DOI
10.3390/app10176116
ISSN
2076-3417
Abstract
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed. In particular, the redirection JavaScript in the landing site is obfuscated to avoid detection systems. In this paper, we propose a lightweight detection system based on static analysis to classify the obfuscation type and to promptly detect the obfuscated redirection JavaScript. The proposed model detects the obfuscated redirection JavaScript by converting the JavaScript into an abstract syntax tree (AST). Then, the structure and token information are extracted. Specifically, we propose a lightweight AST to identify the obfuscation type and the revised term frequency-inverse document frequency to efficiently detect the malicious redirection JavaScript. This approach enables rapid identification of the obfuscated redirection JavaScript and proactive blocking of the webpages that are used in drive-by-download attacks.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE