A targeted web crawling for building malicious javascript collection

  • Authors:
  • Peter Likarish;Eunjin Jung

  • Affiliations:
  • The University of Iowa, Iowa City, USA;The University of Iowa, Iowa City, IA, USA

  • Venue:
  • Proceedings of the ACM first international workshop on Data-intensive software management and mining
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malicious javascript frequently serves as a starting point of web-based attacks, in particular cross-site scripting. Thus detecting malicious javascript before execution can protect users from attacks such as malware infection, drive-by downloads, and even from participating in denial-of-service attacks as part of botnet sometimes. A large collection of malicious javascript would help with detector development, but by the time crawler arrives at blacklisted domains attackers and malicious scripts are often long gone. We have used classifiers to direct a web crawler better towards more likely locations of malicious scripts, and show how this targeted web crawler performs compared to crawler seed with blacklisted-domains.