An ANN approach to identify malicious URLs ECE 539 – Final Project Jayneel Gandhi.

Slides:



Advertisements
Similar presentations
World IPv6 Day: June Why We Care and You Should Too! Phil Roberts –author- Christian OFlaherty –messenger-
Advertisements

Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
Security Issues and Challenges in Cloud Computing
Digital Posters Mrs Bhayat. Lesson ObjectivesLesson Objectives To learn what features can be used to create a digital poster To research appropriate information.
TESTING DIFFERENT CLASSIFICATION APPROACHES BASED ON FACE RECOGNITION APPLICATION AHMED HELMI ABULILA.
When Good Services Go Wild: Reassembling Web Services for Unintended Purposes Feng Lu, Jiaqi Zhang, Stefan Savage UC San Diego.
WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds Liang Wang *, Antonio Nappa +, Juan Caballero +, Thomas Ristenpart *, Aditya Akella * *
URLDoc: Learning to Detect Malicious URLs using Online Logistic Regression Presented by : Mohammed Nazim Feroz 11/26/2013.
Lecturer: Ghadah Aldehim
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker Computer Science.
1 San Diego, California 25 February Securing Routing: RPKI Overview Mark Kosters Chief Technology Officer.
For more info visit at For more info visit at
Optimizing Traditional and Advocating New Prevention Methods Mark Jenne Tatiana Alexenko Cross-Site-Request-Forgery.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Learning to Detect Malicious URLs Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker Computer Science & Engineering UC San Diego Presentation for Google.
Resources Research – Group 7.  Foras  Journals and Newsletters  Associations  Courses and Seminars.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /3/17 1 Data Mining and Machine Learning Lab.
Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang and Nagendra Modadugu – Google First Workshop on Hot Topics in Understanding Botnets (HotBots.
INFO 344 Web Tools And Development CK Wang University of Washington Spring 2014.
A Framework for Detection and Measurement of Phishing Attacks Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 2/25/2016 Slide.
How to Create Website Part – I - Domain. Domain Name – How much it is familiar to you?  Use it everyday, every hour, every minute like google in
The Domain Name System The Components, Functions, Legality and Issues of the Domain Name System.
WELCOME TO SITIATA. Time Card Calculator If you want to best calculating software then visit in sitiata. We are providing a best Time Card Calculator.
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
Web Hosting Info Guide.  It is service that allows user to post web pages to the internet.  It allows users to publish their own information resources.
Is the Domain Name System the heart of the internet?
 Guest Speaker: Micheline Wagner  Using Technology in the Social Studies Classroom  Sharing of Resources  Sharing of Reflections of Lessons.
Free Dating Websites Importance of Free Dating Websites With most of us getting busier by each day, getting a date online seems.
Identifying Suspicious URLs: An Application of Large-Scale Online Learning Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker Computer Science & Engineering.
Outline History of Internet Internet Properties TCP/IP IP Address Domain Name Internet Infrastructure Server and Clients 2.
CJA 314 Week 2 DQ 3 To purchase this material link Week-2-DQ-3 CJA 314 Week 2 DQ 3 What are some benefits.
Gourmet Food Online -
Gorilla Camera Tripod for Sale
Shop for Jalapeno Ketchup - Bottegagourmet.com
Discount Candle Making Materials and Supplies - Cozyourscandlemaking.com
Airbnb Clone - Vacation Rental Software - Airbnb Script
Loose Leaf Black Tea - Pekoe Tea Company
Practical Censorship Evasion Leveraging Content Delivery Networks
MALICIOUS URL DETECTION For Machine Learning Coursework
Enjoy your Holiday With Space Renting Script. Space renting script  It is a web based rental script. You can use our software for any rental based system.web.
Cybersecurity: Threat Matrix
Internet internet.
Cat Scratching Lounge - dnclifestyle.com.au
Online Banking Security
Website URL
Features For more information, visit us at: smart-bracelet-h3 Thank You.
Backpage York An Alternative To Backpage. Backpage.me.uk Backpage.me.uk provides similar features like backpage with some additional services. Backpage.
The best site similar to backpage.com Backpage Sierra Vistais
Backpage San Gabriel Valley Sites like backpage Alternative to Backpage.
OnlineCasino.info. Best Online Casinos 2018 at
Internet Basics February 20, 2018.
Managing Online Services
Detecting Online Commercial Intention (OCI)
Objectives To understand the about types of computer network
Internet Safety Going Places Safely.
SmartWhoIs SmartWhois runs on Windows. Both 32- and 64-bit versions are supported. An evaluation version is available in the Download Area.  SmartWhoIs.
Internet Safety Going Places Safely.
You will be given the answer. You must give the correct question.
Thank You!! For More Information Visit: m/ Call to :
Want to get in touch with an IUD Specialist in Arizona? Stop running around and simply visit
Computer Networks Primary, Secondary and Root Servers
Online Yahoo Mail help Phone Number
Distributed Network Calculations for Large Networks
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
TRANCO: A Research-Oriented Top Sites Ranking Hardened Against Manipulation By Prudhvi raju G id:
Presentation transcript:

An ANN approach to identify malicious URLs ECE 539 – Final Project Jayneel Gandhi

Motivation Prevent users from visiting malicious webpage Lot of effort into reducing internet crimes Try to learn which URL is malicious from different sources Stop users from accessing such website in future

Data Set (1) Developed by SysNet group at University of California at San Diego Posted at UCI Machine Learning Repository putation putation

Data Set (2) Feature Space is made up of: – Lexical Features Hostname Primary Domain Path Tokens – Host Based Features WHOIS info IP prefix Geographical Feature Vector (sparse): 3,231,961 Number of instances: 2,396,130 HUGE data set !!! Takes long time to run … in the range of days

Learning Model Source: Sysnet group webpage at University of California, San Diego

Experiments (1) Data set organized as URLs visited over the period of 121 days (Day0-Day120) Each day has roughly 15,000-40,000 URLs visited I will only be running experiments on Day0 consisting of URLs

Experiment (2) Experiment 1 – Use single perceptron model Online learning possible Has history of all the URLs visited is preserved Experiment 2 – Use Support Vector Machine (SVM) Online learning not possible Can only learn based on certain past history Losses certain history with time

THANK YOU…