Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017, Article ID 5360472, 9 pages
https://doi.org/10.1155/2017/5360472
Research Article

Defending Malicious Script Attacks Using Machine Learning Classifiers

Department of Computer Systems & Communication Technologies, Faculty of Computer Science & Information Technology, Universiti Malaysia Sarawak, 94300 Kota Samarahan, Sarawak, Malaysia

Correspondence should be addressed to Nayeem Khan; ym.saminu.awsis@94001051

Received 27 October 2016; Accepted 29 December 2016; Published 7 February 2017

Academic Editor: Paul Honeine

Copyright © 2017 Nayeem Khan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. “Internet Security Threat Report,” Symantec, Vol. 21, April 2016.
  2. M. Van Gundy and H. Chen, “Noncespaces: using randomization to enforce information ow tracking and thwart cross-site scripting attacks,” in Proceedings of the Network and Distributed System Security Symposium (NDSS '09), pp. 1–18, San Diego, Califo, USA, February 2009.
  3. A. E. Nunan, E. Souto, E. M. dos Santos, and E. Feitosa, “Automatic classification of cross-site scripting in web pages using document-based and URL-based features,” in Proceedings of the 17th IEEE Symposium on Computers and Communication (ISCC '12), pp. 702–707, IEEE, Cappadocia, Turkey, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Schütt, M. Kloft, A. Bikadorov, and K. Rieck, “Early detection of malicious behavior in javascript code,” in Proceedings of the 5th ACM Workshop on Artificial Intelligence and Security (AISec '12), pp. 15–24, Raleigh, NC, USA, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. K. Rieck, T. Krueger, and A. Dewald, “Cujo: efficient detection and prevention of drive-by-download attacks,” in Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC '10), pp. 31–39, Austin, Tex, USA, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert, “ZOZZLE: fast and precise in-browser JavaScript malware detection,” in Proceedings of the 20th USENIX Conference on Security (SEC '11), San Francisco, Calif, USA, 2011.
  7. M. Fraiwan, R. Al-Salman, N. Khasawneh, and S. Conrad, “Analysis and identification of malicious JavaScript code,” Information Security Journal, vol. 21, no. 1, pp. 1–11, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. S. Guarnieri and V. B. Livshits, “GATEKEEPER: mostly static enforcement of security and reliability policies for javascript code,” in Proceedings of the 18th Conference on USENIX Security Symposium (SSYM '09), vol. 10, Montreal, Canada, August 2009.
  9. M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay, “Safe active content in sanitized JavaScript,” Tech. Rep., Google, 2008. View at Google Scholar
  10. N. Khan, J. Abdullah, and A. S. Khan, “Towards vulnerability prevention model for web browser using interceptor approach,” in Proceedings of the 9th International Conference on IT in Asia (CITA '15), pp. 1–5, Seoul, Korea, August 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. T. Johnson and P. Seeling, “Desktop and mobile web page comparison: Characteristics, trends, and implications,” IEEE Communications Magazine, vol. 52, no. 9, pp. 144–151, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. S. C. Y. Johnson, Yet Another Compiler-Compiler, vol. 32, Bell Laboratories, Murray Hill, NJ, USA, 1975.
  13. DeRemer, Franklin L. Practical translators for LR (k) languages, Diss. MIT, 1969.
  14. leakiEst, School of Computer Science, University of Birmingham, Birmingham, UK.
  15. R. Kohavi and G. H. John, “The wrapper approach,” in Feature Extraction, Construction and Selection, pp. 33–50, Springer, New York, NY, USA, 1998. View at Google Scholar
  16. B. E. Boser, I. M. Guyon, and V. N. Vapnik, “Training algorithm for optimal margin classifiers,” in Proceedings of the 5th Annual ACM Workshop on Computational Learning Theory, pp. 144–152, ACM, July 1992. View at Scopus
  17. J. Zurada, “Does feature reduction help improve the classification accuracy rates? a credit scoring case using a german data set,” Review of Business Information Systems (RBIS), vol. 14, no. 2, 2010. View at Publisher · View at Google Scholar
  18. D. Lewis David, “Naive (Bayes) at forty: the independence assumption in information retrieval,” in Machine Learning: ECML-98: 10th European Conference on Machine Learning Chemnitz, Germany, April 21–23, 1998 Proceedings, vol. 1398 of Lecture Notes in Computer Science, pp. 4–15, Springer, Berlin, Germany, 1998. View at Publisher · View at Google Scholar
  19. B. E. Boser, I. M. Guyon, and V. N. Vapnik, “Training algorithm for optimal margin classifiers,” in Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory, pp. 144–152, Pittsburgh, Pa, USA, July 1992. View at Scopus
  20. V. Vapnik and A. Lerner, “Pattern recognition using generalized portrait method,” Automation and Remote Control, vol. 24, no. 6, pp. 774–780, 1963. View at Google Scholar
  21. N. S. Altman, “An introduction to kernel and nearest-neighbor nonparametric regression,” The American Statistician, vol. 46, no. 3, pp. 175–185, 1992. View at Publisher · View at Google Scholar · View at MathSciNet
  22. A. E. Nunan, E. Souto, E. M. Dos Santos, and E. Feitosa, “Automatic classification of cross-site scripting in web pages using document-based and URL-based features,” in Proceedings of the 17th IEEE Symposium on Computers and Communication (ISCC '12), pp. 000702–000707, Cappadocia, Turkey, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. Weka, University of Waikato, New Zealand.
  24. M.-Y. Kan and H. O. N. Thi, “Fast webpage classification using URL features,” in Proceedings of the 14th ACM International Conference on Information and Knowledge Management (CIKM '05), pp. 325–326, Bremen, Germany, November 2005. View at Publisher · View at Google Scholar · View at Scopus
  25. J. Z. Kolter and M. A. Maloof, “Learning to detect and classify malicious executables in the wild,” Journal of Machine Learning Research, vol. 7, pp. 2721–2744, 2006. View at Google Scholar · View at MathSciNet
  26. S. Garera, N. Provos, M. Chew, and A. D. Rubin, “A framework for detection and measurement of phishing attacks,” in Proceedings of the ACM Workshop on Recurring Malcode (WORM '07), pp. 1–8, ACM, Alexandria, Va, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. D. K. McGrath and M. Gupta, “Behind phishing: an examination of phisher modi operandi,” LEET, vol. 8, p. 4, 2008. View at Google Scholar
  28. M. Polychronakis and N. Provos, “Ghost turns zombie: exploring the life cycle of web-based malware,” LEET, vol. 2, pp. 1–8, 2008. View at Google Scholar
  29. F. Ahmed, H. Hameed, M. Zubair Shafiq, and M. Farooq, “Using spatio-temporal information in API calls with machine learning algorithms for malware detection,” in Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence (AISec '09), Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar
  30. A. Abbasi, F. M. Zahedi, and S. Kaza, “Detecting fake medical web sites using recursive trust labeling,” ACM Transactions on Information Systems, vol. 30, no. 4, article 22, 2012. View at Publisher · View at Google Scholar · View at Scopus
  31. S. Huda, J. Abawajy, M. Alazab, M. Abdollalihian, R. Islam, and J. Yearwood, “Hybrids of support vector machine wrapper and filter based framework for malware detection,” Future Generation Computer Systems, vol. 55, pp. 376–390, 2016. View at Publisher · View at Google Scholar · View at Scopus
  32. M. Alazab, “Profiling and classifying the behavior of malicious codes,” Journal of Systems and Software, vol. 100, pp. 91–102, 2015. View at Publisher · View at Google Scholar · View at Scopus
  33. I. A. Al-Taharwa, H.-M. Lee, A. B. Jeng, K.-P. Wu, C.-S. Ho, and S.-M. Chen, “JSOD: JavaScript obfuscation detector,” Security and Communication Networks, vol. 8, no. 6, pp. 1092–1107, 2015. View at Publisher · View at Google Scholar · View at Scopus