Title: Detecting obfuscated JavaScripts from known and unknown obfuscators using machine learning
Authors : Rennhard, Marc
Paganoni, Sergio
Tellenbach, Bernhard
Published in : International Journal on Advances in Security
Volume(Issue) : 9
Issue : 3/4
Pages : 196
Pages to: 206
Publisher / Ed. Institution : International Academy, Research, and Industry Association ( IARIA )
Issue Date: 2016
Language : Englisch / English
Subjects : Machine Learning; JavaScript obfuscation
Subject (DDC) : 005: Computerprogramme, Datenverarbeitung
Abstract: JavaScript is a common attack vector to probe for known vulnerabilities to select a fitting exploit or to manipulate the Document Object Model (DOM) of a web page in a harmful way. The JavaScripts used in such attacks are often obfuscated to make them hard to detect using signature-based approaches. On the other hand, since the only legitimate reason to obfuscate a script is to protect intellectual property, there are not many scripts that are both benign and obfuscated. A detector that can reliably detect obfuscated JavaScripts would therefore be a valuable tool in fighting JavaScript based attacks. In this paper, we compare the performance of nine different classifiers with respect to correctly classifying obfuscated and non-obfuscated scripts. For our experiments, we use a data set of regular, minified, and obfuscated samples from jsDeliver and the Alexa top 5000 websites and a set of malicious samples from MELANI. We find that the best of these classifiers, the boosted decision tree classifier, performs very well to correctly classify obfuscated and non-obfuscated scripts with precision and recall rates of around 99 percent. The boosted decision tree classifier is then used to assess how well this approach can cope with scripts obfuscated by an obfuscator not present in our training set. The results show that while it may work for some obfuscators, it is still critical to have as many different obfuscators in the training set as possible. Finally, we describe the results from experiments to classify malicious obfuscated scripts when no such scripts are included in the training set. Depending on the set of features used, it is possible to detect about half of those scripts, even though those samples do not seem to use any of the obfuscators used in our training set.
Departement: School of Engineering
Organisational Unit: Institut für Angewandte Informationstechnologie (InIT)
Publication type: Beitrag in wissenschaftlicher Zeitschrift / Article in scientific Journal
ISSN: 1942-2636
URI: https://digitalcollection.zhaw.ch/handle/11475/1601
Appears in Collections:Publikationen School of Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.