Počet záznamů: 1  

Discriminative models for multi-instance problems with tree-structure

  1. 1.
    SYSNO ASEP0507120
    Druh ASEPC - Konferenční příspěvek (mezinárodní konf.)
    Zařazení RIVD - Článek ve sborníku
    NázevDiscriminative models for multi-instance problems with tree-structure
    Tvůrce(i) Pevný, T. (CZ)
    Somol, Petr (UTIA-B) RID
    Celkový počet autorů2
    Zdroj.dok.Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security (AISec'16). - New York : ACM, 2016 - ISBN 978-1-4503-4573-6
    Rozsah strans. 83-91
    Poč.str.9 s.
    Forma vydáníTištěná - P
    Akcethe 2016 ACM Workshop on Artificial Intelligence and Security (AISec'16)
    Datum konání28.10.2016 - 28.10.2016
    Místo konáníVienna
    ZeměAT - Rakousko
    Typ akceWRD
    Jazyk dok.eng - angličtina
    Země vyd.US - Spojené státy americké
    Klíč. slovabig data ; learning indicators of compromise ; malware detection ; neural network ; user modeling
    Vědní obor RIVBC - Teorie a systémy řízení
    Obor OECDAutomation and control systems
    Institucionální podporaUTIA-B - RVO:67985556
    UT WOS000391051600008
    EID SCOPUS85001945953
    DOI10.1145/2996758.2996761
    AnotaceModelling network traffic is gaining importance to counter modern security threats of ever increasing sophistication. It is though surprisingly difficult and costly to construct reliable classifiers on top of telemetry data due to the variety and complexity of signals that no human can manage to interpret in full. Obtaining training data with sufficiently large and variable body of labels can thus be seen as a prohibitive problem. The goal of this work is to detect infected computers by observing their HTTP(S) traffic collected from network sensors, which are typically proxy servers or network firewalls, while relying on only minimal human input in the model training phase. We propose a discriminative model that makes decisions based on a computer's all traffic observed during a predefined time window (5 minutes in our case). The model is trained on traffic samples collected over equally-sized time windows for a large number of computers, where the only labels needed are (human) verdicts about the computer as a whole (presumed infected vs. presumed clean). As part of training, the model itself learns discriminative patterns in traffic targeted to individual servers and constructs the final high-level classifier on top of them. We show the classifier to perform with very high precision, and demonstrate that the learned traffic patterns can be interpreted as Indicators of Compromise. We implement the discriminative model as a neural network with special structure reflecting two stacked multi instance problems. The main advantages of the proposed configuration include not only improved accuracy and ability to learn from gross labels, but also automatic learning of server types (together with their detectors) that are typically visited by infected computers.
    PracovištěÚstav teorie informace a automatizace
    KontaktMarkéta Votavová, votavova@utia.cas.cz, Tel.: 266 052 201.
    Rok sběru2020
Počet záznamů: 1  

  Tyto stránky využívají soubory cookies, které usnadňují jejich prohlížení. Další informace o tom jak používáme cookies.