2014 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing 2014
DOI: 10.1109/synasc.2014.39
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Guide for Detecting the Java Script-Based Malware Using Hidden Markov Models and Linear Classifiers

Abstract: The World Wide Web evolved so rapidly that it is no longer considered a luxury, but a necessity. That is why currently the most popular infection vectors used by cybercriminals are either web pages or commonly used documents (such as pdf files). In both of these cases, the malicious actions performed are written in JavaScript. Because of this, JavaScript has become the preferred language for spreading malware. In order to be able to stop malicious content from executing, detection of its infection vector is cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Cosovan et al [20] investigated various detection approaches to JS-based malware attacks. In the study, multiple versions of linear classification, Hidden Markov Models, and ensemble model techniques have been used.…”
Section: A Description Of Primary Studies (Ps)mentioning
confidence: 99%
“…Cosovan et al [20] investigated various detection approaches to JS-based malware attacks. In the study, multiple versions of linear classification, Hidden Markov Models, and ensemble model techniques have been used.…”
Section: A Description Of Primary Studies (Ps)mentioning
confidence: 99%
“…V. Shen used a high-level fuzzy Petri net (HLFPN) to detect JavaScript malware [20]. D. Cosovan used hidden markov models and linear classifiers to detect JavaScript-based malware [6]. Last but not least, D. Maiorca et al used discriminant and adversary-aware API analysis to detect malicious scripting code [12].…”
Section: Related Workmentioning
confidence: 99%
“…Once a user enables macros in an office document it may download a payload that contain a Trojan. Similarly if a PDF is viewed by a privileged user, a JavaScript can be automatically launched to run a malicious shellcode [27], [84]. Since anti-virus software often fail to detect these hidden malware and there is a good chance for users to run the file this mechanism becomes highly effective for delivering Trojans [54], [58], [83].…”
Section: Email Attachmentsmentioning
confidence: 99%