2014
DOI: 10.1016/j.jnca.2013.03.009
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and effective realtime prediction of drive-by download attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 33 publications
0
12
0
Order By: Relevance
“…The evaluation showed that the false negative rates are under 5%, while false positive rates are under 0.03%. Jayasinghe et al [10] detected drive-by download attacks at runtime using lightweight dynamic analysis of the bytecode stream generated by a web browser during page content execution. They utilized naive Bayes, support vector machines (SVM) and decision tree as binary classifiers and SVM achieved the best score with almost 95% accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…The evaluation showed that the false negative rates are under 5%, while false positive rates are under 0.03%. Jayasinghe et al [10] detected drive-by download attacks at runtime using lightweight dynamic analysis of the bytecode stream generated by a web browser during page content execution. They utilized naive Bayes, support vector machines (SVM) and decision tree as binary classifiers and SVM achieved the best score with almost 95% accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…web browser with the forensic engine named ChromePic [38], which could record and reconstruct the process of common web attacks based on Chromium. Jayasinghe et al proposed a novel dynamic approach to detect drive-by download attacks [1], and it can monitor the bytecode generated by a browser in real time with low performance overhead. Studies based on the page content analysis fall on the next step of our research, and some can be integrated into the proposed framework in this paper.…”
Section: Page Content Analysis Vadrevu Et Al Proposed a Newmentioning
confidence: 99%
“…Web browsers are the important sources of malware to infect the target computers. For example, users download and install software bundled with malicious codes from the third-party website, or users encounter phishing attacks and access the fake page, or the web browser loads a web page with vulnerability exploitation codes and triggers the infection of malware [1]. Meanwhile, the incorrect con guration of legitimate applications may also cause the ex ltration of privacy data.…”
Section: Introductionmentioning
confidence: 99%
“…Semi‐static analysis could be evaded by using code obfuscation or by rearranging the code . Some solutions have been proposed that make use of anomaly detection instead of simple pattern matching techniques, such as in and . They are based on a classifier that needs to be trained with a set of malicious and a set of benign samples, which allows to discern the set of features characterizing the execution of malicious code.…”
Section: Detecting Malicious Javascript Codementioning
confidence: 99%