Enhanced Approach to Detect Malicious VBScript Files Based on Data Mining Techniques

被引:3
|
作者
Wael, Doaa [1 ,2 ]
Sayed, Samir G. [2 ,3 ]
AbdelBaki, Nashwa [1 ]
机构
[1] Nile Univ, Giza, Egypt
[2] NTRA, EG CERT, Giza, Egypt
[3] Helwan Univ, Cairo, Egypt
关键词
Malicious scripts; Malware analysis; VBScripts; Script-based malware;
D O I
10.1016/j.procs.2018.10.127
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Script-based malware has been used profusely in last years. It is not only provides malware writers with traditional capabilities of File-based malware but also, increases the evasion techniques by deploying different easy methods of script obfuscation techniques. Moreover, according to McAfee Labs Threat Report, Script-based malwares were used to hit healthcare sector in 2017. Healthcare accounted for more than 26 percent of the 52 million new cyber incidents in the second quarter of 2017. In this paper, new detection features have been added to Wael et. al's algorithm in order to improve the detection ratio and decrease the false positive results. The proposed algorithm is used to detect malicious scripts specifically for VBScript files. It is based on machine learning techniques and static analysis of the defined features. Experimental results show that the suggested algorithm can achieve 98% detection ratio. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:552 / 558
页数:7
相关论文
共 50 条
  • [1] Malicious VBScript Detection Algorithm Based on Data-Mining Techniques
    Wael, Doaa
    Shosha, Ahmed
    Sayed, Samir G.
    2017 INTL CONF ON ADVANCED CONTROL CIRCUITS SYSTEMS (ACCS) SYSTEMS & 2017 INTL CONF ON NEW PARADIGMS IN ELECTRONICS & INFORMATION TECHNOLOGY (PEIT), 2017, : 112 - 116
  • [2] Data Mining Based Strategy for Detecting Malicious PDF Files
    Sayed, Samir G.
    Shawkey, Mohamed
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 661 - 667
  • [3] Predicting Malicious Software in IoT Environment Based on Machine Learning and Data Mining Techniques
    Alharbi, Abdulmohsen
    Hamid, Abdul
    Lahza, Husam
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (08) : 497 - 506
  • [4] Malicious Code Forensics based on Data Mining
    Li, Xiaohua
    Dong, Xiaomei
    Wang, Yulong
    2013 10TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2013, : 978 - 983
  • [5] Detection of Malicious Requests on Web Logs Using Data Mining Techniques
    Sahin, Mehmet Emin
    Ozdemir, Suat
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 463 - 468
  • [6] Rootkit (Malicious Code) Prediction through Data Mining Methods and Techniques
    Ramani, R. Geetha
    Kumar, Suresh S.
    Jacob, Shomona Gracia
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 510 - 514
  • [7] Artificial intelligence-based approach to detect malicious users using deep learning and optimization techniques
    Sailaja Terumalasetti
    Reeja S R
    Multimedia Tools and Applications, 2025, 84 (8) : 3979 - 4001
  • [8] The Algorithm of Malicious Code Detection Based on Data Mining
    Yang, Yubo
    Zhao, Yang
    Liu, Xiabi
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [9] A Joint Approach to Detect Malicious URL Based on Attention Mechanism
    Peng, Yongfang
    Tian, Shengwei
    Yu, Long
    Lv, Yalong
    Wang, Ruijin
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2019, 18 (03)
  • [10] Handover detection approach based on trajectory data mining techniques
    Han, Nan
    Qiao, Shaojie
    Liu, Dunhu
    Ding, Peng
    Zhang, Yongqing
    Xiong, Xi
    Wang, Mengran
    Gutierrez, Louis Alberto
    JOURNAL OF ENGINEERING-JOE, 2018, (16): : 1534 - 1537