资源描述:
《JavaScript ObfuscationObfuscation的混嚼》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、InternationalJournalInternationalJournalInternationalJournalofAdvancedScienceandTechnologyofAdvancedScienceandTechnologyofAdvancedScienceandTechnologyofAdvancedScienceandTechnologyVol26,January2011Vol26,January2011Vol26,January2011SuspiciousMaliciousWebSiteDetectionwithStrengthAnalysisofaJavaScrip
2、tObfuscationByung-IkKim,Chae-TaeIm,Hyun-ChulJungKoreaInternet&SecurityAgencykbi1983@kisa.or.kr,chtim@kisa.or.kr,hcjung@kisa.or.krAbstractThecyberattacksusingwebsitesforapersonalinformationsaleorbreakdowntheinfrastructuresareincreasing.Topreventcyberattacks,virtualcomputersystemsarehiredanddynamicm
3、aliciouswebsiteanalysissystemsareused.Howeverthedynamicanalysissystemshavetosettingupatargetedenvironmentandhaveathreatofrealattack.Unlikelythedynamicanalysissystem,astaticmaliciouswebsiteanalysissystemcandownloadawebpagesourceandanalysisthewebpage.Thestaticanalysisalgorismalsohasproblem,theanalys
4、istimeislongerthandynamicsystemsandneedahumanchecking.Forthisreason,thisjournalsuggestnewanalysissystemreducingthedynamicandstaticsystem'sproblemsusingsuspiciousmaliciouswebsitedetectionwithstrengthanalysisofaJavaScriptobfuscationfornewhybridanalysissystem.Keywords:MaliciousWebSites,ObfuscationJav
5、aScript,Entropy,Frequency,Density1.PrefaceRecently,personalinformationleaksontheInternetandtheattacksagainstsocialinfrastructureareontherise.Generally,theattackerinsertsanattackcodeintothewebsiteusingtheInternet,orcausesadownloadoftheattackingprogramtotheuser’scomputer.Theseattackscanbemadeconveni
6、entlyusingJavaScriptonawebsite.Inaddition,theJavaScriptobfuscationtechniqueisusedtohideJavaScriptcontainingtheattackcode.VariousmethodsareusedtopreventattackmadethroughInternetwebsites.Thereisadynamicanalysissystemthatdetectsmaliciousbehaviorofthewebsitebydirectlyvisitingthesiteinquestionandanalyz
7、ingtheresult.Asthedynamicanalysissystemvisitsthewebsiteandanalyzestheresult,itisvulnerabletoanattack.Ittakeslongerthananhourtovisitandanalyzethesite,andthesystemenvironmentshouldbecreatedthatcanmakeanattack.There