Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

IFIP International Conference on Network and Parallel Computing

NPC 2012: Network and Parallel Computing pp 129–137Cite as

  1. Home
  2. Network and Parallel Computing
  3. Conference paper
Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites

Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites

  • R. Krishnaveni20,
  • C. Chellappan20 &
  • R. Dhanalakshmi20 
  • Conference paper
  • 2398 Accesses

  • 2 Citations

Part of the Lecture Notes in Computer Science book series (LNTCS,volume 7513)

Abstract

JavaScripts are mostly used by the malicious websites to attack the client systems. To detect and prevent this, static and dynamic analysis systems are used which has problems like longer analysis time, setting up of virtual environment and prone to real attacks. Hence a new hybrid analysis system is proposed which reduces the shortcomings of the static and dynamic analysis systems. Additional features such as keywords to words ratio, average line length, presence of suspicious URLs and tags, whitespace percentage, number of redirections, and enigmatic variable names are used to measure the strength of the obfuscation. In this system performance is improved and the number of false positives and negatives are reduced. Based on the strength of obfuscation in the JavaScript code, a website is determined to be benign or malicious.

Keywords

  • Malicious Web Sites
  • JavaScript Obfuscation
  • JavaScript Extraction
  • Hybrid Strength Analysis System

Download conference paper PDF

References

  1. Malzilla.org Rhino: JavaScript for Java, http://www.mozilla.org/rhino

  2. Choi, Y.H., Kim, T.G., Choi, S.J.: Automatic Detection for Javascript Obfuscation Attacks in Web Pages through String Pattern Analysis. International Journal of Security and Its Applications 4(2), 13–26 (2010)

    Google Scholar 

  3. Lin, C.-H., Liu, J.-C., Chen, C.-R.: Access Log Generator for Analyzing Malicious Website Browsing Behaviors. In: Fifth International Conference on Information Assurance and Security (2009)

    Google Scholar 

  4. Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs. In: KDD 2009, Paris, France (2009)

    Google Scholar 

  5. Guan, D.J., Chen, C.-M., Luo, J.-S., Hou, Y.-T.: Malicious Web Page Detection Based on Anomaly Semantics. In: Fourth Joint Workshop on Information Security (JWIS 2009), Kaohsiung, Taiwan (2009)

    Google Scholar 

  6. Cova, M., Kruegel, C., Vigna, G.: Detection and Analsis of Drive-by-Download Attacks and Malicious JavaScript Code. Management of Computing and Information Systems (2010)

    Google Scholar 

  7. Bőscher, A., Meier, M., Benzmőller, R.: Throwing a MonkeyWrench into Web Attacks Plans. In: International Fedration for Information Processing, pp.28–39 (2010)

    Google Scholar 

  8. Kim, B.-I., Im, C.-T., Jung, H.-C.: Suspicious Malicious Web Site Detection with Strength Analysis of a JavaScript Obfuscation. International Journal of Advanced Science and Technology 26 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer Science & Engineering, Anna University, Chennai, India

    R. Krishnaveni, C. Chellappan & R. Dhanalakshmi

Authors
  1. R. Krishnaveni
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. C. Chellappan
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. R. Dhanalakshmi
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Computer Science and Engineering, SeoulTech, 172 Gongreung 2-dong, Nowon-gu, 139-743, Seoul, Korea

    James J. Park

  2. School of Information Technologies, The University of Sydney, Building J12, 2006, Sydney, NSW, Australia

    Albert Zomaya

  3. Division of Computer Engineering, Mokwon University, 88 Do-An-Buk-Ro, Seo-gu, 302-729, Daejeon, Korea

    Sang-Soo Yeo

  4. Department of Computer and Information Science and Engineering, University of Florida, CSE 301, 32611, Gainesville, FL, USA

    Sartaj Sahni

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 IFIP International Federation for Information Processing

About this paper

Cite this paper

Krishnaveni, R., Chellappan, C., Dhanalakshmi, R. (2012). Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites. In: Park, J.J., Zomaya, A., Yeo, SS., Sahni, S. (eds) Network and Parallel Computing. NPC 2012. Lecture Notes in Computer Science, vol 7513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35606-3_15

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-35606-3_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35605-6

  • Online ISBN: 978-3-642-35606-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature