z-logo
open-access-imgOpen Access
Malicious Javascript Detection based on Clustering Techniques
Author(s) -
Nguyễn Hồng Sơn,
Ha Thanh Dung
Publication year - 2021
Publication title -
international journal of network security and its applications/international journal of network security and applications
Language(s) - English
Resource type - Journals
eISSN - 0975-2307
pISSN - 0974-9330
DOI - 10.5121/ijnsa.2021.13602
Subject(s) - javascript , computer science , code (set theory) , cluster analysis , unobtrusive javascript , artificial intelligence , source code , programming language , machine learning , rich internet application , set (abstract data type)
Malicious JavaScript code is still a problem for website and web users. The complication and equivocation of this code make the detection which is based on signatures of antivirus programs becomes ineffective. So far, the alternative methods using machine learning have achieved encouraging results, and have detected malicious JavaScript code with high accuracy. However, according to the supervised learning method, the models, which are introduced, depend on the number of labeled symbols and require significant computational resources to activate. The rapid growth of malicious JavaScript is a real challenge to the solutions based on supervised learning due to the lacking of experience in detecting new forms of malicious JavaScript code. In this paper, we deal with the challenge by the method of detecting malicious JavaScript based on clustering techniques. The known symbols that will be analyzed, the characteristics which are extracted, and a detection processing technique applied on output clusters are included in the model. This method is not computationally complicated, as well as the typical case experiments gave positive results; specifically, it has detected new forms of malicious JavaScript code.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here