An Approach for Malicious JavaScript Detection Using Adaptive Taylor Harris Hawks Optimization-Based Deep Convolutional Neural Network

An Approach for Malicious JavaScript Detection Using Adaptive Taylor Harris Hawks Optimization-Based Deep Convolutional Neural Network

Scaria Alex, Dhiliphan Rajkumar T.
Copyright: © 2022 |Volume: 13 |Issue: 5 |Pages: 20
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781668462393|DOI: 10.4018/IJDST.300354
Cite Article Cite Article

MLA

Alex, Scaria, and Dhiliphan Rajkumar T. "An Approach for Malicious JavaScript Detection Using Adaptive Taylor Harris Hawks Optimization-Based Deep Convolutional Neural Network." IJDST vol.13, no.5 2022: pp.1-20. http://doi.org/10.4018/IJDST.300354

APA

Alex, S. & T., D. R. (2022). An Approach for Malicious JavaScript Detection Using Adaptive Taylor Harris Hawks Optimization-Based Deep Convolutional Neural Network. International Journal of Distributed Systems and Technologies (IJDST), 13(5), 1-20. http://doi.org/10.4018/IJDST.300354

Chicago

Alex, Scaria, and Dhiliphan Rajkumar T. "An Approach for Malicious JavaScript Detection Using Adaptive Taylor Harris Hawks Optimization-Based Deep Convolutional Neural Network," International Journal of Distributed Systems and Technologies (IJDST) 13, no.5: 1-20. http://doi.org/10.4018/IJDST.300354

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

JavaScript has to become a pervasive web technology that facilitates interactive and dynamic Web sites. The extensive usage and the properties permit the authors to simply obfuscate the code and make JavaScript an interesting place for hackers. JavaScript is usually used for adding functionalities and improving the usage of web applications. Despite several merits and usages of JavaScript, the major issue is that several recent cyber-attacks like drive-by-download attacks utilized the susceptibility of JavaScript codes. This paper devises a novel technique for detecting malicious JavaScript. Here, JavaScript codes are fed to the feature extraction phase for extracting the noteworthy features that include execution time, function calls, conditional statements, break statements, and Boolean. The extracted features are further subjected to data transformation wherein log transformation is adapted to normalize the data. Then, feature selection is performed using mutual information.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.