2017
DOI: 10.1155/2017/5360472
|View full text |Cite
|
Sign up to set email alerts
|

Defending Malicious Script Attacks Using Machine Learning Classifiers

Abstract: The web application has become a primary target for cyber criminals by injecting malware especially JavaScript to perform malicious activities for impersonation. Thus, it becomes an imperative to detect such malicious code in real time before any malicious activity is performed. This study proposes an efficient method of detecting previously unknown malicious java scripts using an interceptor at the client side by classifying the key features of the malicious code. Feature subset was obtained by using wrapper … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
19
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(20 citation statements)
references
References 18 publications
1
19
0
Order By: Relevance
“…The creation of a training set may face difficulties. The protection of web applications, for example, should contain all combinations of endpoints devices and cookies due to their high number [ 11 ]. Overcoming such difficulties is crucial for the dataset quality to perform high accuracy classification.…”
Section: Related Workmentioning
confidence: 99%
“…The creation of a training set may face difficulties. The protection of web applications, for example, should contain all combinations of endpoints devices and cookies due to their high number [ 11 ]. Overcoming such difficulties is crucial for the dataset quality to perform high accuracy classification.…”
Section: Related Workmentioning
confidence: 99%
“…Link Guard works by breaking down the contrasts between the visual connection and the real link.it first concentrates the DNS names from the genuine and the visual connection .it at that point looks at the real and visual DNS names, if these names are not the same ,at that point it is phishing of class. Nayeem Khan, Johari Abdullah, Adnan Shahid Khan [9] these author has design methodologies for defending malicious script attacks using machine learning classifies algorithm Naïve Bayes. Security is based on to correlative methodologies, signature based and heuristic based identification approaches.…”
Section: Related Workmentioning
confidence: 99%
“…User's identity and privacy must be always protected especially when performing authentication. The proposed work can be extended to enhance end to end security mechanism in network intrusion detection system or malware detection system (Ahmad et al, 2021;Dildar et al, 2017;Khan et al, 2017).…”
Section: Introductionmentioning
confidence: 99%