• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于卷积神经网络堆叠的易受攻击JavaScript函数检测

Vulnerable JavaScript functions detection using stacking of convolutional neural networks.

作者信息

Sheneamer Abdullah

机构信息

Computer Science Department, Jazan University, Jazan, Saudi Arabia.

出版信息

PeerJ Comput Sci. 2024 Feb 29;10:e1838. doi: 10.7717/peerj-cs.1838. eCollection 2024.

DOI:10.7717/peerj-cs.1838
PMID:38435587
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10909211/
Abstract

System security for web-based applications is paramount, and for the avoidance of possible cyberattacks it is important to detect vulnerable JavaScript functions. Developers and security analysts have long relied upon static analysis to investigate vulnerabilities and faults within programs. Static analysis tools are used for analyzing a program's source code and identifying sections of code that need to be further examined by a human analyst. This article suggests a new approach for identifying vulnerable code in JavaScript programs by using ensemble of convolutional neural networks (CNNs) models. These models use vulnerable information and code features to detect related vulnerable code. For identifying different vulnerabilities in JavaScript functions, an approach has been tested which involves the stacking of CNNs with misbalancing, random under sampler, and random over sampler. Our approach uses these CNNs to detect vulnerable code and improve upon current techniques' limitations. Previous research has introduced several approaches to identify vulnerable code in JavaScript programs, but often have their own limitations such as low accuracy rates and high false-positive or false-negative results. Our approach addresses this by using the power of convolutional neural networks and is proven to be highly effective in the detection of vulnerable functions that could be used by cybercriminals. The stacked CNN approach has an approximately 98% accuracy, proving its robustness and usability in real-world scenarios. To evaluate its efficacy, the proposed method is trained using publicly available JavaScript blocks, and the results are assessed using various performance metrics. The research offers a valuable insight into better ways to protect web-based applications and systems from potential threats, leading to a safer online environment for all.

摘要

基于Web的应用程序的系统安全性至关重要,为避免可能的网络攻击,检测易受攻击的JavaScript函数非常重要。长期以来,开发人员和安全分析师一直依靠静态分析来调查程序中的漏洞和故障。静态分析工具用于分析程序的源代码,并识别需要人工分析师进一步检查的代码段。本文提出了一种使用卷积神经网络(CNN)模型集成来识别JavaScript程序中易受攻击代码的新方法。这些模型利用漏洞信息和代码特征来检测相关的易受攻击代码。为了识别JavaScript函数中的不同漏洞,已经测试了一种方法,该方法涉及将CNN与不平衡、随机欠采样和随机过采样相结合。我们的方法使用这些CNN来检测易受攻击的代码,并改进当前技术的局限性。以前的研究已经介绍了几种识别JavaScript程序中易受攻击代码的方法,但往往有其自身的局限性,如准确率低、误报或漏报结果高。我们的方法通过利用卷积神经网络的力量来解决这个问题,并被证明在检测网络犯罪分子可能使用的易受攻击函数方面非常有效。堆叠式CNN方法的准确率约为98%,证明了其在实际场景中的鲁棒性和可用性。为了评估其有效性,使用公开可用的JavaScript代码块对所提出的方法进行训练,并使用各种性能指标对结果进行评估。该研究为更好地保护基于Web的应用程序和系统免受潜在威胁提供了有价值的见解,为所有人带来更安全的在线环境。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/b156594ba492/peerj-cs-10-1838-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/6d78f5ee904c/peerj-cs-10-1838-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/b83a7a5bfed0/peerj-cs-10-1838-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/c28def261c62/peerj-cs-10-1838-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/65b2b0e1eef3/peerj-cs-10-1838-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/d66df13e02ad/peerj-cs-10-1838-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/43316e166128/peerj-cs-10-1838-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/9e56d59d1ddf/peerj-cs-10-1838-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/aad183b20b2a/peerj-cs-10-1838-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/bfc4f3418fdc/peerj-cs-10-1838-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/23448890309c/peerj-cs-10-1838-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/6d73b96a0049/peerj-cs-10-1838-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/fb92c0a618e5/peerj-cs-10-1838-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/55367fc455db/peerj-cs-10-1838-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/932c2845acef/peerj-cs-10-1838-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/2a3380e17171/peerj-cs-10-1838-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/b1f78f6fc921/peerj-cs-10-1838-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/b156594ba492/peerj-cs-10-1838-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/6d78f5ee904c/peerj-cs-10-1838-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/b83a7a5bfed0/peerj-cs-10-1838-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/c28def261c62/peerj-cs-10-1838-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/65b2b0e1eef3/peerj-cs-10-1838-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/d66df13e02ad/peerj-cs-10-1838-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/43316e166128/peerj-cs-10-1838-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/9e56d59d1ddf/peerj-cs-10-1838-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/aad183b20b2a/peerj-cs-10-1838-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/bfc4f3418fdc/peerj-cs-10-1838-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/23448890309c/peerj-cs-10-1838-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/6d73b96a0049/peerj-cs-10-1838-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/fb92c0a618e5/peerj-cs-10-1838-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/55367fc455db/peerj-cs-10-1838-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/932c2845acef/peerj-cs-10-1838-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/2a3380e17171/peerj-cs-10-1838-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/b1f78f6fc921/peerj-cs-10-1838-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/166b/10909211/b156594ba492/peerj-cs-10-1838-g017.jpg

相似文献

1
Vulnerable JavaScript functions detection using stacking of convolutional neural networks.基于卷积神经网络堆叠的易受攻击JavaScript函数检测
PeerJ Comput Sci. 2024 Feb 29;10:e1838. doi: 10.7717/peerj-cs.1838. eCollection 2024.
2
Comparative Analysis of Open-Source Tools for Conducting Static Code Analysis.用于进行静态代码分析的开源工具的比较分析
Sensors (Basel). 2023 Sep 19;23(18):7978. doi: 10.3390/s23187978.
3
Benefits, challenges, and usability evaluation of DeloreanJS: a back-in-time debugger for JavaScript.DeloreanJS的优势、挑战及可用性评估:一款适用于JavaScript的时光回溯调试器
PeerJ Comput Sci. 2023 Feb 24;9:e1238. doi: 10.7717/peerj-cs.1238. eCollection 2023.
4
Development and Validation of a Convolutional Neural Network Model to Predict a Pathologic Fracture in the Proximal Femur Using Abdomen and Pelvis CT Images of Patients With Advanced Cancer.利用晚期癌症患者腹部和骨盆 CT 图像建立卷积神经网络模型预测股骨近端病理性骨折的研究
Clin Orthop Relat Res. 2023 Nov 1;481(11):2247-2256. doi: 10.1097/CORR.0000000000002771. Epub 2023 Aug 23.
5
JACLNet:Application of adaptive code length network in JavaScript malicious code detection.JACLNet:自适应码长网络在 JavaScript 恶意代码检测中的应用。
PLoS One. 2022 Dec 14;17(12):e0277891. doi: 10.1371/journal.pone.0277891. eCollection 2022.
6
Convolutional Neural Networks in the Inspection of Serrasalmids (Characiformes) Fingerlings.
Animals (Basel). 2024 Feb 13;14(4):606. doi: 10.3390/ani14040606.
7
Single-view 2D CNNs with fully automatic non-nodule categorization for false positive reduction in pulmonary nodule detection.用于减少肺结节检测中假阳性的全自动无结节分类的单视图 2D CNN。
Comput Methods Programs Biomed. 2018 Oct;165:215-224. doi: 10.1016/j.cmpb.2018.08.012. Epub 2018 Aug 31.
8
Transfer-Learning-Based Intrusion Detection Framework in IoT Networks.基于迁移学习的物联网网络入侵检测框架。
Sensors (Basel). 2022 Jul 27;22(15):5621. doi: 10.3390/s22155621.
9
iDetect for vulnerability detection in internet of things operating systems using machine learning.使用机器学习进行物联网操作系统漏洞检测的 iDetect。
Sci Rep. 2022 Oct 12;12(1):17086. doi: 10.1038/s41598-022-21325-x.
10
Transfer of Learning in the Convolutional Neural Networks on Classifying Geometric Shapes Based on Local or Global Invariants.基于局部或全局不变量的卷积神经网络在几何形状分类中的学习迁移
Front Comput Neurosci. 2021 Feb 19;15:637144. doi: 10.3389/fncom.2021.637144. eCollection 2021.

引用本文的文献

1
A trustworthy hybrid model for transparent software defect prediction: SPAM-XAI.一种可信的透明软件缺陷预测混合模型:SPAM-XAI。
PLoS One. 2024 Jul 11;19(7):e0307112. doi: 10.1371/journal.pone.0307112. eCollection 2024.