J-force: Forced execution on javascript

K Kim, IL Kim, CH Kim, Y Kwon, Y Zheng… - Proceedings of the 26th …, 2017 - dl.acm.org
Web-based malware equipped with stealthy cloaking and obfuscation techniques is
becoming more sophisticated nowadays. In this paper, we propose J-FORCE, a crash-free …

Towards fighting cybercrime: Malicious url attack type detection using multiclass classification

T Manyumwa, PF Chapita, H Wu… - 2020 IEEE international …, 2020 - ieeexplore.ieee.org
Malicious Uniform Resource Locators (URLs) re-main one of the most common threats to
cybersecurity. They are commonly spread through phishing, malware and spam. One …

Detection of drive-by download attacks using machine learning approach

M Aldwairi, M Hasan, Z Balbahaith - Cognitive analytics: Concepts …, 2020 - igi-global.com
Drive-by download refers to attacks that automatically download malwares to user's
computer without his knowledge or consent. This type of attack is accomplished by …

LSTM RNN: detecting exploit kits using redirection chain sequences

J Burgess, P O'Kane, S Sezer, D Carlin - Cybersecurity, 2021 - Springer
While consumers use the web to perform routine activities, they are under the constant threat
of attack from malicious websites. Even when visiting 'trusted'sites, there is always a risk that …

Reading network packets as a natural language for intrusion detection

M Mimura, H Tanaka - Information Security and Cryptology–ICISC 2017 …, 2018 - Springer
Detecting unknown malicious traffic is a challenging task. There are many behavior-based
detection methods which use the characteristic of drive-by-download attacks or C&C traffic …

Redirekt: Extracting malicious redirections from exploit kit traffic

J Burgess, D Carlin, P O'Kane… - 2020 IEEE Conference …, 2020 - ieeexplore.ieee.org
This paper proposes REdiREKT, a system which utilises the open-source Zeek Intrusion
Detection System (IDS) to map HTTP redirection chains observed in Exploit Kit (EK) attacks …

Leaving all proxy server logs to paragraph vector

M Mimura, H Tanaka - Journal of Information Processing, 2018 - jstage.jst.go.jp
Cyberattack techniques continue to evolve every day. Detecting unseen drive-by-download
attacks or C&C traffic is a challenging task. Pattern-matching-based techniques and using …

Analysis device, analysis method, and analysis program

Y Takata, M Akiyama, T Yagi - US Patent 10,416,970, 2019 - Google Patents
A program analysis unit of a browser emulator manager exhaustively searches a code by
performing syntax analysis of a code included in web content to search a transfer code to …

[PDF][PDF] Investigation of browser and web-based threats

J Burgess, S Sezer - 2023 - pure.qub.ac.uk
The internet has dramatically expanded over the years, both in size and complexity.
Decreasingly confined to specific geolocations or social groups, users carry out various …

Detection and analysis of drive-by downloads and malicious websites

S Ibrahim, NA Herami, EA Naqbi, M Aldwairi - International Symposium on …, 2019 - Springer
A drive-by download is a download that occurs without user's action or knowledge. It usually
triggers an exploit of vulnerability in a browser to downloads an unknown file. The malicious …