Enhanced Approach to Detect Malicious VBScript Files Based on Data Mining Techniques

被引:3
|
作者
Wael, Doaa [1 ,2 ]
Sayed, Samir G. [2 ,3 ]
AbdelBaki, Nashwa [1 ]
机构
[1] Nile Univ, Giza, Egypt
[2] NTRA, EG CERT, Giza, Egypt
[3] Helwan Univ, Cairo, Egypt
来源
9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018) | 2018年 / 141卷
关键词
Malicious scripts; Malware analysis; VBScripts; Script-based malware;
D O I
10.1016/j.procs.2018.10.127
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Script-based malware has been used profusely in last years. It is not only provides malware writers with traditional capabilities of File-based malware but also, increases the evasion techniques by deploying different easy methods of script obfuscation techniques. Moreover, according to McAfee Labs Threat Report, Script-based malwares were used to hit healthcare sector in 2017. Healthcare accounted for more than 26 percent of the 52 million new cyber incidents in the second quarter of 2017. In this paper, new detection features have been added to Wael et. al's algorithm in order to improve the detection ratio and decrease the false positive results. The proposed algorithm is used to detect malicious scripts specifically for VBScript files. It is based on machine learning techniques and static analysis of the defined features. Experimental results show that the suggested algorithm can achieve 98% detection ratio. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:552 / 558
页数:7
相关论文
共 50 条
  • [21] Use of Data Mining Techniques to Detect Medical Fraud in Health Insurance
    Lin, Kuo-Chung
    Yeh, Ching-Long
    INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY INNOVATION, 2012, 2 (02) : 126 - 137
  • [22] Data mining techniques to detect motor fluctuations in Parkinson's disease
    Bonato, P
    Sherrill, DM
    Standaert, DG
    Salles, SS
    Akay, M
    PROCEEDINGS OF THE 26TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-7, 2004, 26 : 4766 - 4769
  • [23] An Efficient Survey to Detect Alzheimer disease Using Data Mining Techniques
    Bhagtani, Anshul
    Choudhury, Tanupriya
    Raj, Gaurav
    Sharma, Mukul
    PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 64 - 70
  • [24] Approach using Transforming Structural Data into Image for Detection of Malicious MS-DOC Files based on Deep Learning Models
    Yang, Shaojie
    Chen, Wenbo
    Li, Shanxi
    Xu, Qingxiang
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 28 - 32
  • [25] Using a Data Mining Approach to Detect Automobile Insurance Fraud
    Salmi, Mabrouka
    Atif, Dalia
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2021), 2022, 417 : 55 - 66
  • [26] Process mining-based approach for investigating malicious login events
    Lagraa, Sofiane
    State, Radu
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [27] Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm
    Zhang, Bing
    Zhang, Hongchang
    Ren, Rong
    Wen, Zhen
    Wang, Qian
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2024, 34 (07) : 1173 - 1197
  • [28] A Novel Continuous Blood Pressure Estimation Approach Based on Data Mining Techniques
    Miao, Fen
    Fu, Nan
    Zhang, Yuan-Ting
    Ding, Xiao-Rong
    Hong, Xi
    He, Qingyun
    Li, Ye
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2017, 21 (06) : 1730 - 1740
  • [29] A data mining approach based on machine learning techniques to classify biological sequences
    Maddouri, M
    Elloumi, M
    KNOWLEDGE-BASED SYSTEMS, 2002, 15 (04) : 217 - 223
  • [30] Online detect polymorphic exploit based on data mining
    Wang, Wei
    Wang, Huazhang
    Luo, Daisheng
    Fang, Yong
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (ISKE 2007), 2007,