SCEADAN Systematic Classification Engine for Advanced Data ANalysis
|
|
|
- Esther Cooper
- 10 years ago
- Views:
Transcription
1 SCEADAN Systematic Classification Engine for Advanced Data ANalysis Nicole Beebe, Ph.D. The University of Texas at San Antonio Dept. of Info. Systems & Cyber Security Simson Garfinkel, Ph.D. The Naval Postgraduate School Dept. of Computer Science
2 Caveats UTSA funding sources NPS Grant No. N NPS Grant No. N UTSA Provost s Summer Research Mentorship Program Disclaimer Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect the views of the Naval Postgraduate School
3 Motivation, Use Cases, Literature Review BACKGROUND
4 Intro: Data/File Type Determination Challenging on fragments (non-header) and files without accurate signatures/extensions o o o Poor prediction accuracies in large multi-class situations No useful tools available after 10 years of research by field Significant scalability and speed issues
5 Primary Use Cases Digital forensics Focus investigative efforts (e.g. search hit ranking feature) Triage and disk profiling Fragment identification/isolation, file recovery/reassembly Intrusion detection Overcome signature-based obfuscation techniques Anomaly detection Context triggered indication & warning (e.g. payload vs. protocol), as opposed to traffic-based, bursty anomaly detection Exfiltration, extrusion detection and profiling
6 Other Possible Use Cases Firewalls Content based blocking Malware Detection: Content based malware, virus detection Analysis: Mapping binary objects Steganalysis Detecting statistically abnormal file types due to content Isolating stegged data within binary objects CAVEAT: Use traditional methods when you have trusted file signatures!
7 Much research but no tools Literature Review Penrose et al. (2013) Patel and Singh (2013) Alherbawi et al. (2013) Roussev and Quates (2013) Xie et al. (2013) Fitzgerald et al. (2012) Gopal et al. (2011) Axelsson (2010) Conti et al. (2010) Li et al. (2010, 2005) Ahmed et al. (2010, 2009) Cao et al. (2010) Amirani et al. (2012, 2011, 2008) Calhoun and Coles (2008) Moody and Erbacher (2008) Zhang and White (2007) Veenman (2007) Erbacher and Mulholland (2007) Karresand and Shahmehri (2006) Hall and Davis (2006) McDaniel and Heydari (2003) Shannon (2004)
8 Two Fundamental Approaches Naïve statistical classification SCEADAN employs a statistical approach Machine learning or metrics based approaches Byte frequency distribution (n-gram analysis) Complexity measures (entropy, Kolmogrov complexity, etc.) Specialized, semantic based approaches Utilize knowledge of internal file structures Ex: JPEG sections; ZIP local file headers Look for predictive, string based indicators Ex: >>stream preceding a Deflate compressed stream =.PDF Not signature based in traditional sense
9 Byte Frequency Distributions n-gram Analysis: Unigram = 1 byte 256 features \x00, \x01 \xff Bi-gram = 2 bytes 65,536 features \x0000, \x0001, \xffff A few non-ngram features (e.g. entropy, kurtosis, ) Images from Amirani et al. (2012)
10 Including Headers Biases Results Sceadan (2013) Legend No header data in training set Sample includes some header segments All sample observations include headers (unit of analysis = full file) Sceadan (model/tool) does not rely on header segments (but can use them)
11 Tool Developed SCEADAN
12 Tool Developed: Sceadan The name Systematic Classification Engine for Advanced Data ANalysis Old English / Proto-Germanic for To Classify Naïve statistical classifier Classifies independent of signatures, extension, file system data Uses N-gram features (concatenated unigram+bigram vectors) Built-in training and prediction modes Leverages LIBLINEAR ( Uses support vector machines (SVMs) Built-in model ( 50MB), but you can train/use your own
13 True Positive Prediction Rates in our Experiments Type Ext Rate % Delimited.csv 100 JSON records.json 100 Base64 encoding.b Base85 encoding.a Hex encoding.urlenc 100 Postscript.ps 100 Log files.log 99 CSS.css 99 Plain text.text,.txt 98 XML.xml 98 FS-EXT.ext3 97 Java Source Code.java 97 JavaScript code.js 95 Bi-tonal images.tif,.tiff 95 HTML.html 91 GIF.gif 86 MS-XLS.xls 84 MP3.mp3 84 Bitmap.bmp 83 AVI.avi 78 JPG.jpg 76 BZ2.bz2 72 H264.mp4 72 FS-NTFS.ntfs 71 v1.2.1 built-in model performance Type Ext Rate % AAC.m4a 69 MS-DOCX.docx 62 WMV.wmv 59 PDF.pdf 54 MS-DOC.doc 53 MS-XLSX.xlsx 50 FLV.flv,.FLV 44 ZLIB DEFLATE.gz 29 Portable Network Graphic.png 28 FS-FAT.fat 25 MS-PPTX.pptx 21 ZLIB - DEFLATE.zip 20 MS-PPT.ppt 14 ENCRYPTED N/A 13 Average Sceadan prediction accuracy: 71.5%* (NOTE: Later modeling netted 73.5% accuracy) Random chance classification: 1/40 = 2.5% Train/Test: 60%:40% (million fragment sample) * Beebe et al. (2013) Sceadan: Using Concatenated N-Gram Vectors for Improved Data/File Type Classification, IEEE Transactions on Information Forensics and Security, (8:9), pp
14 Sceadan Performance Relative to Others (2013) 100% 90% Higher Accuracy But Few Classes Prediction Accuracy 80% 70% 60% 50% 40% 30% Typical Accuracy Degradation As Multi-Class Challenge Increases Sceadan v % Accuracy* 40 Classes NOTE: 9 lowest performing types are significantly under-researched classes (e.g. Office2010, FS data) 20% 10% 0% Number of Classes Predicted by Classifier *Additional model training has improved classifier accuracy from 71.5% to 73.5%
15 Built-In Model Details (Sceadan v1.2.1) Model file model.ucv-bcv c256.s2.e005 MD5 D068034D64329ECCA25DD76F515656A7 Model trained using digitalcorpora.org files Random subset of GOVDOCS1 files (types: see Beebe et al. 2013) FILETYPES1 data set (UTSA open source file collection) 512B training samples (n=1,800 samples of each type) Segmented all files into 512 byte blocks Removed header sector Model parameters & solver function C=256, e=.005, gamma=n/a (linear kernel) L2 regularized L2 loss function, primal solver
16 Model Building (Training) Motivation It is important to build your own models. Train on different data types High number of classes degrades model performance Experiment with different block sizes, features, etc. Training data must be verified, prepared, cleansed Sceadan optimizes model parameters Runs grid.py Optimizes C (surface smoothing parameter) Optimizes gamma (single training point influence) Sceadan randomly splits sample into train:test sets
17 Other Capabilities Ability to write LibSVM compliant vectors to output Multi-threaded, in-memory/compiled model Creates confusion matrices automatically Sub-block classification capability Can specify sub-block size within files to classify Can classify individual files, or in directory mode: Block offset (0=full file classified) Predicted Type Input path/filename These samples were named <<true type>>.txt
18 Miscellaneous Copyright: University of Texas at San Antonio License: GPLv2 Written in C Linux CLI based Code rewritten/improved in 2014 by NPS To obtain: github.com/nbeebe/sceadan
19 Future Code Development Plans LATEST RESEARCH
20 Scatter Plot of Unigram Weights (4 Models) for.exe Files Positive weighted features help classify sample as type Unigrams (byte values) Negative weighted features help classify sample as NOT type High absolute value features are good discriminators Not all n-grams are equally discriminatory
21 Prediction Accuracy as % Unigrams Decline 100% unigrams 69% accuracy 14% unigrams 65% accuracy 100% unigrams 81% accuracy Research findings suggest 15-20% of unigrams/bigrams can be used to obtain similar performance, at Much reduced computational cost. 12% unigrams 75% accuracy
22 Hierarchical Classification Modeling Advanced, hierarchical classification design Improve accuracy via hierarchical data class classification, followed by data type classification In practice, class classification Conti et al. (2010) Becomes triage mechanism to focus classification efforts Improves prediction accuracy Reduces multi-class size in tough classes Enables better feature selection within classes Reduces problem of over-fitting
23 (210) (210) (Cell) COMMENTS / QUESTIONS?
SCEADAN Systematic Classification Engine for Advanced Data ANalysis
SCEADAN Systematic Classification Engine for Advanced Data ANalysis Nicole Beebe, Ph.D. The University of Texas at San Antonio Dept. of Information Systems & Cyber Security Caveats Funding sources NPS
DETECTING THREATENING INSIDERS WITH LIGHTWEIGHT MEDIA FORENSICS
DETECTING THREATENING INSIDERS WITH LIGHTWEIGHT MEDIA FORENSICS Naval Postgraduate School & The University of Texas at San Antonio Dr. Simson Garfinkel (NPS) & Dr. Nicole Beebe (UTSA) 8am, Wednesday November
Insider Threat Detection
Insider Threat Detection Using Lightweight Media Forensics Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Nicole L. Beebe, Ph.D. Assistant Professor The University of Texas
Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey
RIA SECURITY TECHNOLOGY
RIA SECURITY TECHNOLOGY Ulysses Wang Security Researcher, Websense Hermes Li Security Researcher, Websense 2009 Websense, Inc. All rights reserved. Agenda RIA Introduction Flash Security Attack Vectors
SVM Ensemble Model for Investment Prediction
19 SVM Ensemble Model for Investment Prediction Chandra J, Assistant Professor, Department of Computer Science, Christ University, Bangalore Siji T. Mathew, Research Scholar, Christ University, Dept of
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
Performance Testing Process A Whitepaper
Process A Whitepaper Copyright 2006. Technologies Pvt. Ltd. All Rights Reserved. is a registered trademark of, Inc. All other trademarks are owned by the respective owners. Proprietary Table of Contents
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Clavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
How To Understand How Weka Works
More Data Mining with Weka Class 1 Lesson 1 Introduction Ian H. Witten Department of Computer Science University of Waikato New Zealand weka.waikato.ac.nz More Data Mining with Weka a practical course
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Web Document Clustering
Web Document Clustering Lab Project based on the MDL clustering suite http://www.cs.ccsu.edu/~markov/mdlclustering/ Zdravko Markov Computer Science Department Central Connecticut State University New Britain,
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
Azure Machine Learning, SQL Data Mining and R
Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Towards facilitating reliable recovery of JPEG pictures? P. De Smet
Towards facilitating reliable recovery of JPEG pictures? P. De Smet (edited for public release) [email protected] http://nicc.fgov.be/datarecovery/ Introduction & disclaimer Aim of this talk:
SIPAC. Signals and Data Identification, Processing, Analysis, and Classification
SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is
Anti-Spam Filter Based on Naïve Bayes, SVM, and KNN model
AI TERM PROJECT GROUP 14 1 Anti-Spam Filter Based on,, and model Yun-Nung Chen, Che-An Lu, Chao-Yu Huang Abstract spam email filters are a well-known and powerful type of filters. We construct different
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge
E-commerce Transaction Anomaly Classification
E-commerce Transaction Anomaly Classification Minyong Lee [email protected] Seunghee Ham [email protected] Qiyi Jiang [email protected] I. INTRODUCTION Due to the increasing popularity of e-commerce
PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools
An Oracle Technical White Paper January 2014. How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper January 2014 How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing
Model Selection. Introduction. Model Selection
Model Selection Introduction This user guide provides information about the Partek Model Selection tool. Topics covered include using a Down syndrome data set to demonstrate the usage of the Partek Model
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan 2016. www.vxsearch.com [email protected]. Flexense Ltd.
VX Search FILE SEARCH SOLUTION User Manual Version 8.2 Jan 2016 www.vxsearch.com [email protected] 1 1 Product Overview...4 2 VX Search Product Versions...8 3 Using Desktop Product Versions...9 3.1 Product
Personal Security Practices of the CAO
Personal Security Practices of the CAO 1. Do you forward your government email to your personal email account? 2. When is the last time you changed your Enterprise password? Within the last 60 days Within
WildFire Features. Palo Alto Networks. PAN-OS New Features Guide Version 6.1. Copyright 2007-2015 Palo Alto Networks
WildFire Features Palo Alto Networks PAN-OS New Features Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Using Remote Desktop Clients
CYBER SECURITY OPERATIONS CENTRE December 2011 Using Remote Desktop Clients INTRODUCTION 1. Remote access solutions are increasingly being used to access sensitive or classified systems from homes and
Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms
Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms Scott Pion and Lutz Hamel Abstract This paper presents the results of a series of analyses performed on direct mail
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues
1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
Automated Content Analysis of Discussion Transcripts
Automated Content Analysis of Discussion Transcripts Vitomir Kovanović [email protected] Dragan Gašević [email protected] School of Informatics, University of Edinburgh Edinburgh, United Kingdom [email protected]
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints John Haggerty and Mark Taylor Liverpool John Moores University, School of Computing & Mathematical Sciences, Byrom
Anomaly Management using Complex Event Processing. Bastian Hoßbach and Bernhard Seeger
Anomaly Management using Complex Processing Bastian Hoßbach and Bernhard Seeger Int l Conference on Extending Database Technology Genoa, Italy March 19, 2013 Agenda Introduction Enhanced complex event
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification
A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science {riyad, zincir}@cs.dal.ca
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Data Mining for Knowledge Management. Classification
1 Data Mining for Knowledge Management Classification Themis Palpanas University of Trento http://disi.unitn.eu/~themis Data Mining for Knowledge Management 1 Thanks for slides to: Jiawei Han Eamonn Keogh
Model Deployment. Dr. Saed Sayad. University of Toronto 2010 [email protected]. http://chem-eng.utoronto.ca/~datamining/
Model Deployment Dr. Saed Sayad University of Toronto 2010 [email protected] http://chem-eng.utoronto.ca/~datamining/ 1 Model Deployment Creation of the model is generally not the end of the project.
A Feature Selection Methodology for Steganalysis
A Feature Selection Methodology for Steganalysis Yoan Miche 1, Benoit Roue 2, Amaury Lendasse 1, Patrick Bas 12 1 Laboratory of Computer and Information Science Helsinki University of Technology P.O. Box
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Overview This 4-day class is the first of the two data science courses taught by Rafal Lukawiecki. Some of the topics will be
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
1 Topic. 2 Scilab. 2.1 What is Scilab?
1 Topic Data Mining with Scilab. I know the name "Scilab" for a long time (http://www.scilab.org/en). For me, it is a tool for numerical analysis. It seemed not interesting in the context of the statistical
Data Exfiltration and DNS
WHITE PAPER Closing back-door access to your sensitive data Introduction DNS hasn t changed all that much since Paul Mockapetris invented it in 1983. It still addresses exactly the same requirement stated
FEATURE OVERVIEW. FGX Series firewall. Last updated February 2012
FEATURE OVERVIEW FGX Series firewall Last updated February 2012 Celestix FGX Features Deep Packet Firewall VPN Virtual system DoD/DDoS attach defense Intrusion protection Anti-virus Anti-spam URL filtering
Beating the NCAA Football Point Spread
Beating the NCAA Football Point Spread Brian Liu Mathematical & Computational Sciences Stanford University Patrick Lai Computer Science Department Stanford University December 10, 2010 1 Introduction Over
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science
VWF. Virtual Wafer Fab
VWF Virtual Wafer Fab VWF is software used for performing Design of Experiments (DOE) and Optimization Experiments. Split-lots can be used in various pre-defined analysis methods. Split parameters can
Intrusion Detection Systems
Intrusion Detection Systems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Mathematical Models of Supervised Learning and their Application to Medical Diagnosis
Genomic, Proteomic and Transcriptomic Lab High Performance Computing and Networking Institute National Research Council, Italy Mathematical Models of Supervised Learning and their Application to Medical
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Learning from Diversity
Learning from Diversity Epitope Prediction with Sequence and Structure Features using an Ensemble of Support Vector Machines Rob Patro and Carl Kingsford Center for Bioinformatics and Computational Biology
Data Structure Reverse Engineering
Data Structure Reverse Engineering Digging for Data Structures Polymorphic Software with DSLR Scott Hand October 28 th, 2011 Outline 1 Digging for Data Structures Motivations Introduction Laika Details
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction
COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
CHAD TILBURY. [email protected]. http://forensicmethods.com @chadtilbury
CHAD TILBURY [email protected] 0 Former: Special Agent with US Air Force Office of Special Investigations 0 Current: Incident Response and Computer Forensics Consultant 0 Over 12 years in the trenches
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Programming Exercise 3: Multi-class Classification and Neural Networks
Programming Exercise 3: Multi-class Classification and Neural Networks Machine Learning November 4, 2011 Introduction In this exercise, you will implement one-vs-all logistic regression and neural networks
CSC574 - Computer and Network Security Module: Intrusion Detection
CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus
Semi-Supervised Learning for Blog Classification
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008) Semi-Supervised Learning for Blog Classification Daisuke Ikeda Department of Computational Intelligence and Systems Science,
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Author Gender Identification of English Novels
Author Gender Identification of English Novels Joseph Baena and Catherine Chen December 13, 2013 1 Introduction Machine learning algorithms have long been used in studies of authorship, particularly in
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
The syslog-ng Premium Edition 5F2
The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,
II. RELATED WORK. Sentiment Mining
Sentiment Mining Using Ensemble Classification Models Matthew Whitehead and Larry Yaeger Indiana University School of Informatics 901 E. 10th St. Bloomington, IN 47408 {mewhiteh, larryy}@indiana.edu Abstract
Intrusion Defense Firewall
Intrusion Defense Firewall Available as a Plug-In for OfficeScan 8 Network-Level HIPS at the Endpoint A Trend Micro White Paper October 2008 I. EXECUTIVE SUMMARY Mobile computers that connect directly
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
Lavastorm Analytic Library Predictive and Statistical Analytics Node Pack FAQs
1.1 Introduction Lavastorm Analytic Library Predictive and Statistical Analytics Node Pack FAQs For brevity, the Lavastorm Analytics Library (LAL) Predictive and Statistical Analytics Node Pack will be
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
The Evolution of File Carving [The benefits and problems of forensics recovery]
[ Anandabrata Pal and Nasir Memon ] The Evolution of File Carving [The benefits and problems of forensics recovery] BRAND X PICTURES Year by year, the number of computers and other digital devices being
Active Learning SVM for Blogs recommendation
Active Learning SVM for Blogs recommendation Xin Guan Computer Science, George Mason University Ⅰ.Introduction In the DH Now website, they try to review a big amount of blogs and articles and find the
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
