Deakin University
Browse

File(s) under embargo

Detection of Obfuscated Malicious JavaScript Code

Version 2 2024-06-03, 02:22
Version 1 2024-01-04, 04:48
journal contribution
posted on 2024-06-03, 02:22 authored by Ammar Alazab, Ansam KhraisatAnsam Khraisat, Moutaz Alazab, Sarabjot Singh
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal their malice and elude detection. To secure Internet users, an adequate intrusion-detection system (IDS) for malicious JavaScript must be developed. This paper proposes an automatic IDS of obfuscated JavaScript that employs several features and machine-learning techniques that effectively distinguish malicious and benign JavaScript codes. We also present a new set of features, which can detect obfuscation in JavaScript. The features are selected based on identifying obfuscation, a popular method to bypass conventional malware detection systems. The performance of the suggested approach has been tested on JavaScript obfuscation attacks. The studies have shown that IDS based on selected features has a detection rate of 94% for malicious samples and 81% for benign samples within the dimension of the feature vector of 60.

History

Journal

Future Internet

Volume

14

Article number

217

Pagination

1-15

Location

Basel, Switzerland

ISSN

1999-5903

eISSN

1999-5903

Language

eng

Publication classification

C1.1 Refereed article in a scholarly journal

Issue

8

Publisher

MDPI