MALICIOUS WEB BROWSER EXTENSION DETECTOR
| dc.contributor.author | Chaker, Tayyib Rachid | |
| dc.date.accessioned | 2019-07-24T09:45:45Z | |
| dc.date.available | 2019-07-24T09:45:45Z | |
| dc.date.issued | 2019 | |
| dc.description.abstract | Malicious browser extensions raised a global threat towards web users, their tremendous spreading made internauts vulnerable to all sort of attacks that could be performed those extensions. multiple approaches and techniques were used by security experts to prevent and detect those ill extensions. In this report we propose a hybridization approach of static and dynamic techniques, geared with a machine learning model. The approach focuses on retrieving relevant malicious features, matching malicious pattern and defining new ones through examining the extensions behaviors in real-time on a legit environment with multi factors that work as a trigger to witness the various behaviors possible performed by the extension on the spot light. For our training model, we examined some of the top chrome store extensions, group of malicious extensions discovered by experts but mainly extensions that weren’t studied previously, which were detected by us later. The validation test reached 100% accuracy on several classifiers. | en_US |
| dc.identifier.uri | https://depot.univ-msila.dz/handle/123456789/15833 | |
| dc.language.iso | en | en_US |
| dc.publisher | UNIVERSITY’S MOHAMED BOUDIAF OF M’SILA Faculty of Mathematics and computer sciences -DEPARTMENT: Computer Science - BRANCH: Computer Science OPTION: RTIC | en_US |
| dc.subject | Web, Browser, Extension, Malicious extension, Detector. | en_US |
| dc.title | MALICIOUS WEB BROWSER EXTENSION DETECTOR | en_US |
| dc.type | Thesis | en_US |