Lightweight Detection Method of Obfuscated Landing Sites Based on the AST Structure and Tokens

Saved in:
Bibliographic Details
Title: Lightweight Detection Method of Obfuscated Landing Sites Based on the AST Structure and Tokens
Authors: KyungHyun Han, Seong Oun Hwang
Source: Applied Sciences, Vol 10, Iss 6116, p 6116 (2020)
Publisher Information: MDPI AG
Publication Year: 2020
Collection: Directory of Open Access Journals: DOAJ Articles
Subject Terms: malicious JavaScript, abstract syntax tree, static analysis, obfuscation detection, redirection detection, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Description: Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed. In particular, the redirection JavaScript in the landing site is obfuscated to avoid detection systems. In this paper, we propose a lightweight detection system based on static analysis to classify the obfuscation type and to promptly detect the obfuscated redirection JavaScript. The proposed model detects the obfuscated redirection JavaScript by converting the JavaScript into an abstract syntax tree (AST). Then, the structure and token information are extracted. Specifically, we propose a lightweight AST to identify the obfuscation type and the revised term frequency-inverse document frequency to efficiently detect the malicious redirection JavaScript. This approach enables rapid identification of the obfuscated redirection JavaScript and proactive blocking of the webpages that are used in drive-by-download attacks.
Document Type: article in journal/newspaper
Language: English
Relation: https://www.mdpi.com/2076-3417/10/17/6116; https://doaj.org/toc/2076-3417; https://doaj.org/article/7b5df539245b4bc1ab99a72b2bb9f1e9
DOI: 10.3390/app10176116
Availability: https://doi.org/10.3390/app10176116
https://doaj.org/article/7b5df539245b4bc1ab99a72b2bb9f1e9
Accession Number: edsbas.F99E485
Database: BASE
Description
Abstract:Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed. In particular, the redirection JavaScript in the landing site is obfuscated to avoid detection systems. In this paper, we propose a lightweight detection system based on static analysis to classify the obfuscation type and to promptly detect the obfuscated redirection JavaScript. The proposed model detects the obfuscated redirection JavaScript by converting the JavaScript into an abstract syntax tree (AST). Then, the structure and token information are extracted. Specifically, we propose a lightweight AST to identify the obfuscation type and the revised term frequency-inverse document frequency to efficiently detect the malicious redirection JavaScript. This approach enables rapid identification of the obfuscated redirection JavaScript and proactive blocking of the webpages that are used in drive-by-download attacks.
DOI:10.3390/app10176116