skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition
Rise in Server-Side Script Attacks and Detection Methods

Rise in Server-Side Script Attacks and Detection Methods

/ 4 min read

Quick take - The article discusses the increasing adoption of cloud technologies by businesses, which has led to a rise in server-side script attacks that pose significant security challenges, and presents innovative deep learning-based methodologies for static malware detection that outperform traditional antivirus solutions.

Fast Facts

  • The rise of cloud technologies has led to a significant increase in server-side script attacks, which now account for 40% of all cyberattacks as of 2020.
  • Researchers propose new methodologies for static malware detection using feature extraction techniques like Syntactic Code Highlighting (SCH) and Abstract Syntax Tree (AST) construction.
  • Evaluation of these methods on over 400,000 scripts shows a true positive rate (TPR) of up to 81% and a low false positive rate (FPR) of 0.17%, outperforming traditional antivirus solutions.
  • The study emphasizes the limitations of existing signature-based detection methods and highlights the potential of machine learning to capture malicious behavior patterns.
  • The proposed detection methods effectively address high-priority threats such as cryptominers and ransomware, underscoring the need for advanced techniques to combat the growing threat of script malware.

The Rise of Cloud Technologies and Security Challenges

The adoption of cloud technologies by businesses is on the rise, bringing with it a set of security challenges. One of the most pressing issues is the increase in server-side script attacks. These attacks exploit server-side scripts, which are plaintext files with diverse syntax. This diversity makes them harder to detect compared to standardized executable formats. Server-side scripts can steal sensitive data, compromise user credentials, and disrupt operations. They represent a significant threat, particularly to Linux systems and cloud environments. The prevalence of script malware attacks has reportedly surged by 100% since 2017, and as of 2020, these attacks account for 40% of all cyberattacks.

Innovative Detection Methodologies

To address this rising threat, researchers propose innovative feature extraction and deep learning (DL)-based methodologies tailored specifically for static malware detection of server-side threats. Two primary feature extraction techniques are introduced: Syntactic Code Highlighting (SCH) and Abstract Syntax Tree (AST) construction. SCH employs complex regular expressions to parse the syntactic elements of code, while ASTs provide a hierarchical representation of a program’s structure.

The proposed detection models include a Sequential Model (SM) and a Graph Representation Learning (GRL) model. Both models leverage these feature representations for effective malware detection. The evaluation of these methods was conducted on over 400,000 server-side scripts written in Bash, Python, and Perl. A balanced dataset of 90,000 scripts was allocated for training, validation, and testing. The results indicate that the proposed method achieves a true positive rate (TPR) of up to 81%, significantly outperforming leading signature-based antivirus solutions, with a low false positive rate (FPR) of 0.17%.

Limitations and Future Research

The paper categorizes malware analysis methods into static and dynamic analysis, highlighting that static analysis is typically cheaper, safer, and faster. It underscores the limitations of traditional signature-based detection methods, which struggle against advanced malware that can evade detection through code transformations. Machine learning (ML) is presented as a promising avenue to capture malicious behavior patterns that static signatures often miss.

The authors address several research questions relating to effective feature representation for scalable malware detection and explore the capacity of deep learning models to interpret complex script structures. Their performance is compared to conventional rule-based detectors, revealing that the sequential model effectively extracts hierarchical embeddings from SCORE-H features, while the GRL model enhances detection performance when threat labels are utilized during training.

The paper discusses the limitations of existing antivirus solutions and emphasizes the necessity for advanced code parsing capabilities and deep learning techniques. It highlights the importance of contextual understanding of code for effective malware detection. The scope of the research is confined to server-side scripting languages, specifically Python, Perl, and Bash, acknowledging that the detection methods do not address supply chain attacks.

In conclusion, the authors provide a comprehensive evaluation of their approaches, which outperform commercial antivirus solutions, open-source antivirus, and various ML-based malware detectors. The proposed methods demonstrate coverage for over 95% of high-priority threats, including cryptominers, ransomware, and credential stealers. The authors emphasize the need for effective detection methods specifically targeting script malware due to its rapid growth and powerful capabilities, calling for further research to refine these techniques and address existing challenges, including obfuscated scripts and the need for representative training data.

Original Source: Read the Full Article Here

Check out what's latest