J-force: Forced execution on javascript
Web-based malware equipped with stealthy cloaking and obfuscation techniques is
becoming more sophisticated nowadays. In this paper, we propose J-FORCE, a crash-free …
becoming more sophisticated nowadays. In this paper, we propose J-FORCE, a crash-free …
Towards fighting cybercrime: Malicious url attack type detection using multiclass classification
T Manyumwa, PF Chapita, H Wu… - 2020 IEEE international …, 2020 - ieeexplore.ieee.org
Malicious Uniform Resource Locators (URLs) re-main one of the most common threats to
cybersecurity. They are commonly spread through phishing, malware and spam. One …
cybersecurity. They are commonly spread through phishing, malware and spam. One …
Detection of drive-by download attacks using machine learning approach
M Aldwairi, M Hasan, Z Balbahaith - Cognitive analytics: Concepts …, 2020 - igi-global.com
Drive-by download refers to attacks that automatically download malwares to user's
computer without his knowledge or consent. This type of attack is accomplished by …
computer without his knowledge or consent. This type of attack is accomplished by …
LSTM RNN: detecting exploit kits using redirection chain sequences
While consumers use the web to perform routine activities, they are under the constant threat
of attack from malicious websites. Even when visiting 'trusted'sites, there is always a risk that …
of attack from malicious websites. Even when visiting 'trusted'sites, there is always a risk that …
Reading network packets as a natural language for intrusion detection
M Mimura, H Tanaka - Information Security and Cryptology–ICISC 2017 …, 2018 - Springer
Detecting unknown malicious traffic is a challenging task. There are many behavior-based
detection methods which use the characteristic of drive-by-download attacks or C&C traffic …
detection methods which use the characteristic of drive-by-download attacks or C&C traffic …
Redirekt: Extracting malicious redirections from exploit kit traffic
This paper proposes REdiREKT, a system which utilises the open-source Zeek Intrusion
Detection System (IDS) to map HTTP redirection chains observed in Exploit Kit (EK) attacks …
Detection System (IDS) to map HTTP redirection chains observed in Exploit Kit (EK) attacks …
Leaving all proxy server logs to paragraph vector
M Mimura, H Tanaka - Journal of Information Processing, 2018 - jstage.jst.go.jp
Cyberattack techniques continue to evolve every day. Detecting unseen drive-by-download
attacks or C&C traffic is a challenging task. Pattern-matching-based techniques and using …
attacks or C&C traffic is a challenging task. Pattern-matching-based techniques and using …
Analysis device, analysis method, and analysis program
A program analysis unit of a browser emulator manager exhaustively searches a code by
performing syntax analysis of a code included in web content to search a transfer code to …
performing syntax analysis of a code included in web content to search a transfer code to …
Detection and analysis of drive-by downloads and malicious websites
S Ibrahim, NA Herami, EA Naqbi, M Aldwairi - International Symposium on …, 2019 - Springer
A drive-by download is a download that occurs without user's action or knowledge. It usually
triggers an exploit of vulnerability in a browser to downloads an unknown file. The malicious …
triggers an exploit of vulnerability in a browser to downloads an unknown file. The malicious …