Ji Yuqing, Fang Yanhong, Tan Shunhua, Wang Xueyuan. MALICIOUS JAVASCRIPT CODE DETECTION METHOD BASED ON BI-LSTM MODEL[J]. Computer Applications and Software, 2024, 41(9): 357-362. DOI: 10.3969/j.issn.1000-386x.2024.09.049
Citation: Ji Yuqing, Fang Yanhong, Tan Shunhua, Wang Xueyuan. MALICIOUS JAVASCRIPT CODE DETECTION METHOD BASED ON BI-LSTM MODEL[J]. Computer Applications and Software, 2024, 41(9): 357-362. DOI: 10.3969/j.issn.1000-386x.2024.09.049

MALICIOUS JAVASCRIPT CODE DETECTION METHOD BASED ON BI-LSTM MODEL

  • The traditional static detection methods of malicious JavaScript code rely heavily on existing malicious code features, which cant effectively extract the obfuscated malicious code feature, resulting in low accuracy of detecting obfuscated malicious JavaScript code. To solve this problem, a malicious code detection model based on bidirectional long short-term memory (Bi-LSTM) is proposed. This method transformed JavaScript code into syntactic unit sequence through abstract syntax tree, and used the Doc2Vec algorithm to represent the syntactic unit sequence with distributed vectors. The sentence vector matrix was sent to the Bi-LSTM model for detection. The experimental results show that this method has good detection effect and high detection efficiency for obfuscated malicious JavaScript code, with the accuracy rate of 97.03 % and the recall rate of 97.10 %.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return