MALICIOUS URL DETECTION For Machine Learning Coursework

Slides:



Advertisements
Similar presentations
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Advertisements

Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
Security Issues and Challenges in Cloud Computing
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Norman SecureSurf Protect your users when surfing the Internet.
Combining Supervised and Unsupervised Learning for Zero-Day Malware Detection © 2013 Narus, Inc. Prakash Comar 1 Lei Liu 1 Sabyasachi (Saby) Saha 2 Pang-Ning.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Classification 10/3/2015 Worry-Free Business Security 5.0.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Lexical Feature Based Phishing URL Detection Using Online Learning Reporter: Jing Chiu Advisor: Yuh-Jye Lee /3/17Data.
Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi.
Return to the PC Security web page Lesson 6: Improving Security.
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Computer Security Keeping you and your computer safe in the digital world.
Reach us at Call: | Visit:
Complete Cloud Security Anyone, anywhere, any app, any device.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Top Web Design Dublin Company in Dublin Ireland
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
An ANN approach to identify malicious URLs ECE 539 – Final Project Jayneel Gandhi.
Trend Micro Support for Installing the Latest Version Security 2016.
Securing Information Systems
Anti-Spam Managing Spam with Kerio Connect
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Securing Information Systems
Trend Micro Consumer 2010 Easy. Fast. Smart.
Exchange Online Advanced Threat Protection
Uncovering Social Spammers: Social Honeypots + Machine Learning
Social Media Attacks.
Marking the Most of the Web’s Resources
Critical Security Controls
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
ISYM 540 Current Topics in Information System Management
eScan Antivirus Technical Support Toll Free Number
Computer Virus and Antivirus
Threat Monitoring Center
Lecture 14: Business Information Systems - ICT Security
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
How To Protect Your Computer From Virus Outbreak Malwarebytes Antivirus Support
Webroot Product Key code for Serial Key Activation
Panda is the mostly used Anti-virus Panda is the top antivirus to protect your computer from injurious viruses. Panda Antivirus is the best antivirus.
Exchange Online Advanced Threat Protection
Cyber Security Lesson Quarter 1.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Pradeo Security Systems
Norton.com/Setup | +1(844) | Norton Internet Security
Join In Be Secure Presentation
Cyber Security in New Jersey State Government
Proactive Network Protection Through DNS
Philip Nichilo Vincent Carestia
Introduction to Systems Security
Industry Overview The global AI in cyber security market is predicted to grow at 35.0% CAGR during the forecast period with the market size reaching USD.
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Web design for small busniess
(With Hybrid Network Support)
Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project.
About Us Scanster is one of the leading IT security software company. Our Software's are well integrated system that simplify computer security management.
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Cybersecurity Simplified: Phishing
TRANCO: A Research-Oriented Top Sites Ranking Hardened Against Manipulation By Prudhvi raju G id:
Presentation transcript:

MALICIOUS URL DETECTION For Machine Learning Coursework BY PRAGATHI NARENDRA

PROBLEMS Everything online-> is your data secure?? Cyber attacks- huge threat in current days Monetary loss Theft of private information Malware installation Virus, etc… Cause losses of billions of dollars every year. 

PROBLEMS

EXISTING SOLUTION Existing solution : Blacklisting URL Blacklisting lacks the ability to detect newly generated malicious URL’s. [1]

PROPOSED SOLUTION Classifying Web sites into 3 classes: Benign (0), Spam (1) and Malicious (2) Classification based on features of URL 1. Lexical features 2. Popularity 3. Host based features Merit : Site checked without accessing-reduces vulnerability of user.

PROPOSED SOLUTION

EXAMPLE

REFERENCES [1] -Malicious URL Detection using Machine Learning: A Survey Doyen Sahoo, Chenghao Liu, and Steven C.H. Hoi http://sysnet.ucsd.edu/projects/url/detecting malicious URL’s http://archive.ics.uci.edu/ml/datasets/URL+Reputation

THANK YOU ANY QUESTIONS??