Enhancing JavaScript Malware Detection through Weighted Behavioral DFAs

📅 2025-05-27
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Traditional JavaScript malware detection methods suffer from low accuracy, poor interpretability, and weak adaptability to zero-day threats due to the increasing sophistication and rapid proliferation of obfuscated and polymorphic variants. To address these challenges, this paper proposes a fine-grained detection approach based on weighted behavioral Deterministic Finite Automata (DFA). It models malicious behavioral patterns in JavaScript execution sequences and constructs the first behavior-aware DFA capable of dynamically matching both exact and partially similar malicious sequences. By integrating behavior-weighted modeling with real-time execution monitoring, the method enables interpretable classification into benign, partially malicious, and fully malicious behaviors. Evaluated on 1,058 real-world JavaScript execution sequences, the approach significantly improves zero-day variant detection rates while maintaining high precision and decision transparency.

Technology Category

Application Category

📝 Abstract
This work addresses JavaScript malware detection to enhance client-side web application security with a behavior-based system. The ability to detect malicious JavaScript execution sequences is a critical problem in modern web security as attack techniques become more sophisticated. This study introduces a new system for detecting JavaScript malware using a Deterministic Finite Automaton (DFA) along with a weighted-behavior system, which we call behavior DFA. This system captures malicious patterns and provides a dynamic mechanism to classify new sequences that exhibit partial similarity to known attacks, differentiating them between benign, partially malicious, and fully malicious behaviors. Experimental evaluation on a dataset of 1,058 sequences captured in a real-world environment demonstrates the capability of the system to detect and classify threats effectively, with the behavior DFA successfully identifying exact matches and partial similarities to known malicious behaviors. The results highlight the adaptability of the system in detecting emerging threats while maintaining transparency in decision making.
Problem

Research questions and friction points this paper is trying to address.

Enhancing JavaScript malware detection for web security
Detecting sophisticated malicious JavaScript execution sequences
Classifying JavaScript behaviors as benign or malicious dynamically
Innovation

Methods, ideas, or system contributions that make the work stand out.

Behavior-based DFA for malware detection
Weighted system classifies partial similarities
Dynamic mechanism for emerging threat detection
🔎 Similar Papers
No similar papers found.
P
Pedro Pereira
GECAD, ISEP, Polytechnic of Porto, rua Dr. António Bernardino de Almeida, 4249-015 Porto, Portugal
J
José Gonçalves
GECAD, ISEP, Polytechnic of Porto, rua Dr. António Bernardino de Almeida, 4249-015 Porto, Portugal
J
João Vitorino
GECAD, ISEP, Polytechnic of Porto, rua Dr. António Bernardino de Almeida, 4249-015 Porto, Portugal
Eva Maia
Eva Maia
GECAD-ISEP
CyberSecurityArtificial InteligenceMachine LearningIndustry 4.0Encryption
Isabel Praça
Isabel Praça
Professor, ISEP