Skip to main content

Real-Time Malicious Script Blocking Technology at the Host-Level

  • Conference paper
  • First Online:
Advances on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2016)

Abstract

Due to the diversity of mobile devices, interests have been increased towards HTML5, the next generation’s web standard which pursues cross platform. To play media files or process 3D graphics in previous HTML environments, users had to install non-standard plug-ins such as Silverlight or Active X. On the other hand, HTML5 provides new tag functions of audio, video etc and new java script functions of Websocket, Geolocation API etc to substitute non-standard technologies such as Active X. To use such functions of HTML5, web browser developers are competitively applying HTML5 to their browsers, making the active conversion to HTML5 a global trend of today. Along with such trend, however, the risk of new cyber attacks taking advantage of java scripts, the key function of HTML5, is also increasing. Cyber attacks based on scripts can trigger vicious actions when the user just accesses web pages inserted with vicious scripts, and thus there are limits in detection using previous security technologies. This paper proposes a technology which collects and analyzes HTTP traffic generated through web browsers at host level to detect and block vicious scripts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. W3C, “HTML5 Standard”, April 20 2015, http://www.w3.org/standards

  2. Gartner, “Gartner Identifies Top 10 Mobile Technologies and Capabilities for 2015 and 2016”, February 24 2014.

    Google Scholar 

  3. KISA, WebCheck. Available: http://webcheck.kisa.or.kr

  4. McAfee. SiteAdviser. Available : http://www.siteadvisor.com

  5. Young-wook Lee, Dong-jae Jeong, Sang-hoon Jeon, and Chae-ho Im, “Design and Implementation of Web-browser based Malicious behavior Detection System(WMDS)” Journal of Information Security & Cryptology June, 2012

    Google Scholar 

  6. Tinyproxy, https://tinyproxy.github.io/

  7. YARA Documentation, http://yara.readthedocs.org/en/latest/index.html

  8. Chrome V8, https://developers.google.com/v8

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to HwanKuk Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Oh, S., Bae, H., Park, S., Kim, H. (2017). Real-Time Malicious Script Blocking Technology at the Host-Level. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49106-6_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49105-9

  • Online ISBN: 978-3-319-49106-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics