International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-6  ( Jun, 2024 )
Past issues
  1. Volume-12,Issue-5  ( May, 2024 )
  2. Volume-12,Issue-4  ( Apr, 2024 )
  3. Volume-12,Issue-3  ( Mar, 2024 )
  4. Volume-12,Issue-2  ( Feb, 2024 )
  5. Volume-12,Issue-1  ( Jan, 2024 )
  6. Volume-11,Issue-12  ( Dec, 2023 )
  7. Volume-11,Issue-11  ( Nov, 2023 )
  8. Volume-11,Issue-10  ( Oct, 2023 )
  9. Volume-11,Issue-9  ( Sep, 2023 )
  10. Volume-11,Issue-8  ( Aug, 2023 )

Statistics report
Oct. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 138
Paper Published : 1629
No. of Authors : 4297
  Journal Paper


Paper Title :
Analysis And Detection Of Multiple Malicious Java Applets Based On Static Code Analysis: A Survey

Author :Sapana y. Salunkhe, Tareek M. Pattewar

Article Citation :Sapana y. Salunkhe ,Tareek M. Pattewar , (2015 ) " Analysis And Detection Of Multiple Malicious Java Applets Based On Static Code Analysis: A Survey " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 34-38, Volume-3, Issue-2

Abstract : Malicious web content is a major attack vector on the Internet. Typically, the attacker's goal is to install and run a piece of malware on the victim's computer. The research community has not given to this problem the attention it deserves, and, the approaches to the detection of malicious Java applets are based either on simple signatures or on the use of honey-clients, which are both easily avoided. The proposed novel approach to the detection of malicious Java applets based on static code analysis. The approach extracts a number of features from Java applets, and uses supervised machine learning to produce a classifier. This approach is able to detect both known and previously-unseen real-world malicious applets. We can extend our analysis to consider multiple applets that appear on the same web page together. Keywords- Code obfuscation, Disassembly, Honeyclients, Malicious Web Content

Type : Research paper

Published : Volume-3, Issue-2


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1678   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 83
| Published on 2015-01-30
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY