2021
DOI: 10.1186/s42400-021-00093-7
|View full text |Cite
|
Sign up to set email alerts
|

LSTM RNN: detecting exploit kits using redirection chain sequences

Abstract: While consumers use the web to perform routine activities, they are under the constant threat of attack from malicious websites. Even when visiting ‘trusted’ sites, there is always a risk that site is compromised, and, hosting a malicious script. In this scenario, the injected script would typically force the victim’s browser to undergo a series of redirects before reaching an attacker-controlled domain, which, delivers the actual malware. Although these malicious redirection chains aim to frustrate detection … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…• A4: The ML based detection system must be evaluated using more than one classifier. Although this may seem evident, there are some works for EK detection such as [14] that consider only one classification algorithm to obtain results. • A5: Benign and malware samples should not correspond to different time periods [50].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…• A4: The ML based detection system must be evaluated using more than one classifier. Although this may seem evident, there are some works for EK detection such as [14] that consider only one classification algorithm to obtain results. • A5: Benign and malware samples should not correspond to different time periods [50].…”
Section: Methodsmentioning
confidence: 99%
“…At the time of writing this work, a new EK has emerged named Purple Fox that includes several 1-day exploits such as CVE-2021-26411 and CVE-2020-0674 [10]. The research community has been also active in this area (as we analyze in Section 3), while the latest works (i.e., published in 2020 & 2021) analyze EKs from various point of views including browser forensics, detection methodologies, and the role of underground economy in the continuous development of EKs [11], [12], [13], [14], [15]. Overall, we argue that the problem of EKs still poses a viable threat to both individuals and organizations.…”
Section: Problem Statement and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…A clustering approach based on extracted features from contextual information is implemented in this process. The work carried out by Burgess et al [36] address the problems associated with security of web-contents, which is another essential concern in SEO process. The authors have used Long Short-Term Memory (LSTM) for identifying the possible threat in traffic associated with web-content while making redirection in HTTP.…”
Section: Review Of Seo Approaches Using MLmentioning
confidence: 99%
“…First, use the input x t at the present moment and the external condition h t−1 at the previous moment to calculate f t , i t , o t and c t . Secondly, use f t and i t to update the memory unit c t , and finally, pass the internal state information to the external state h t in combination with o t [23].…”
Section: Bi-lstm Modelmentioning
confidence: 99%