MALICIOUS WEB BROWSER EXTENSION DETECTOR

dc.contributor.authorChaker, Tayyib Rachid
dc.date.accessioned2019-07-24T09:45:45Z
dc.date.available2019-07-24T09:45:45Z
dc.date.issued2019
dc.description.abstractMalicious browser extensions raised a global threat towards web users, their tremendous spreading made internauts vulnerable to all sort of attacks that could be performed those extensions. multiple approaches and techniques were used by security experts to prevent and detect those ill extensions. In this report we propose a hybridization approach of static and dynamic techniques, geared with a machine learning model. The approach focuses on retrieving relevant malicious features, matching malicious pattern and defining new ones through examining the extensions behaviors in real-time on a legit environment with multi factors that work as a trigger to witness the various behaviors possible performed by the extension on the spot light. For our training model, we examined some of the top chrome store extensions, group of malicious extensions discovered by experts but mainly extensions that weren’t studied previously, which were detected by us later. The validation test reached 100% accuracy on several classifiers.en_US
dc.identifier.urihttps://depot.univ-msila.dz/handle/123456789/15833
dc.language.isoenen_US
dc.publisherUNIVERSITY’S MOHAMED BOUDIAF OF M’SILA Faculty of Mathematics and computer sciences -DEPARTMENT: Computer Science - BRANCH: Computer Science OPTION: RTICen_US
dc.subjectWeb, Browser, Extension, Malicious extension, Detector.en_US
dc.titleMALICIOUS WEB BROWSER EXTENSION DETECTORen_US
dc.typeThesisen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
CHAKER TAYYIB RACHID.pdf
Size:
1.76 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections