恶意javascript攻击签名自动生成技术

Soojin Yoon, Jonghun Jung, Myoungsun Noh, Kyungho Chung, Chaetae Im
{"title":"恶意javascript攻击签名自动生成技术","authors":"Soojin Yoon, Jonghun Jung, Myoungsun Noh, Kyungho Chung, Chaetae Im","doi":"10.1109/ICMIC.2014.7020779","DOIUrl":null,"url":null,"abstract":"Most attack on web is Drive-by-Download that malware or worm is downloaded on user's device, be activated, and attack user's device or other server. However, new attack appear which can work without downloading. It is HashDoS. HashDoS does not need downloading, it use malicious JavaScript as attack tool. Although there is several research about malicious javascripts, to my best of knowledge, there is no research of generating attack signature for malicious javascripts. This paper proposes automatic attack signature generation technology for malicious javascripts. And it shows test result that proposed technology is suitable for detecting malicious javascripts.","PeriodicalId":405363,"journal":{"name":"Proceedings of 2014 International Conference on Modelling, Identification & Control","volume":"119 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Automatic attack signature generation technology for malicious javascript\",\"authors\":\"Soojin Yoon, Jonghun Jung, Myoungsun Noh, Kyungho Chung, Chaetae Im\",\"doi\":\"10.1109/ICMIC.2014.7020779\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Most attack on web is Drive-by-Download that malware or worm is downloaded on user's device, be activated, and attack user's device or other server. However, new attack appear which can work without downloading. It is HashDoS. HashDoS does not need downloading, it use malicious JavaScript as attack tool. Although there is several research about malicious javascripts, to my best of knowledge, there is no research of generating attack signature for malicious javascripts. This paper proposes automatic attack signature generation technology for malicious javascripts. And it shows test result that proposed technology is suitable for detecting malicious javascripts.\",\"PeriodicalId\":405363,\"journal\":{\"name\":\"Proceedings of 2014 International Conference on Modelling, Identification & Control\",\"volume\":\"119 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 2014 International Conference on Modelling, Identification & Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMIC.2014.7020779\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2014 International Conference on Modelling, Identification & Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMIC.2014.7020779","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

大多数网络攻击都是通过下载驱动的方式,将恶意软件或蠕虫下载到用户的设备上,然后被激活,攻击用户的设备或其他服务器。然而,新的攻击出现了,不需要下载就可以工作。它是HashDoS。HashDoS不需要下载,它使用恶意JavaScript作为攻击工具。虽然有一些关于恶意javascript的研究,但据我所知,目前还没有针对恶意javascript生成攻击签名的研究。提出了针对恶意javascript的攻击签名自动生成技术。测试结果表明,该技术适用于检测恶意javascript。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Automatic attack signature generation technology for malicious javascript
Most attack on web is Drive-by-Download that malware or worm is downloaded on user's device, be activated, and attack user's device or other server. However, new attack appear which can work without downloading. It is HashDoS. HashDoS does not need downloading, it use malicious JavaScript as attack tool. Although there is several research about malicious javascripts, to my best of knowledge, there is no research of generating attack signature for malicious javascripts. This paper proposes automatic attack signature generation technology for malicious javascripts. And it shows test result that proposed technology is suitable for detecting malicious javascripts.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信