Combining Supervised and Unsupervised Learning for Zero-Day Malware Detection © 2013 Narus, Inc. Prakash Comar 1 Lei Liu 1 Sabyasachi (Saby) Saha 2 Pang-Ning.

Slides:



Advertisements
Similar presentations
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Advertisements

CISC Machine Learning for Solving Systems Problems John Cavazos Dept of Computer & Information Sciences University of Delaware
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
Ao-Jan Su † Y. Charlie Hu ‡ Aleksandar Kuzmanovic † Cheng-Kok Koh ‡ † Northwestern University ‡ Purdue University How to Improve Your Google Ranking: Myths.
Discriminative and generative methods for bags of features
Properties of Machine Learning Applications for Use in Metamorphic Testing Chris Murphy, Gail Kaiser, Lifeng Hu, Leon Wu Columbia University.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Machine Learning as Applied to Intrusion Detection By Christine Fossaceca.
Big Data Analytics and Challenge Presented by Saurabh Rastogi Asst. Prof. in Maharaja Agrasen Institute of Technology B.Tech(IT), M.Tech(IT)
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
Introduction to machine learning
Automated malware classification based on network behavior
A Hybrid Model to Detect Malicious Executables Mohammad M. Masud Latifur Khan Bhavani Thuraisingham Department of Computer Science The University of Texas.
CISC Machine Learning for Solving Systems Problems Presented by: Akanksha Kaul Dept of Computer & Information Sciences University of Delaware SBMDS:
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Jay Stokes, Microsoft Research John Platt, Microsoft Research Joseph Kravis, Microsoft Network Security Michael Shilman, ChatterPop, Inc. ALADIN: Active.
DPNM, POSTECH 1/23 NOMS 2010 Jae Yoon Chung 1, Byungchul Park 1, Young J. Won 1 John Strassner 2, and James W. Hong 1, 2 {dejavu94, fates, yjwon, johns,
Network Intrusion Detection Using Random Forests Jiong Zhang Mohammad Zulkernine School of Computing Queen's University Kingston, Ontario, Canada.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
AUTHORS: ASAF SHABTAI, URI KANONOV, YUVAL ELOVICI, CHANAN GLEZER, AND YAEL WEISS "ANDROMALY": A BEHAVIORAL MALWARE DETECTION FRAMEWORK FOR ANDROID.
CSE 473/573 Computer Vision and Image Processing (CVIP) Ifeoma Nwogu Lecture 24 – Classifiers 1.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Data mining for credit card fraud: A comparative study.
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
Special topics on text mining [ Part I: text classification ] Hugo Jair Escalante, Aurelio Lopez, Manuel Montes and Luis Villaseñor.
Automated Classification and Analysis of Internet Malware M. Bailey J. Oberheide J. Andersen Z. M. Mao F. Jahanian J. Nazario RAID 2007 Presented by Mike.
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
Probabilistic Graphical Models for Semi-Supervised Traffic Classification Rotsos Charalampos, Jurgen Van Gael, Andrew W. Moore, Zoubin Ghahramani Computer.
Classifiers Given a feature representation for images, how do we learn a model for distinguishing features from different classes? Zebra Non-zebra Decision.
1 Pattern Recognition Pattern recognition is: 1. A research area in which patterns in data are found, recognized, discovered, …whatever. 2. A catchall.
CISC Machine Learning for Solving Systems Problems Presented by: Ashwani Rao Dept of Computer & Information Sciences University of Delaware Learning.
Identification of amino acid residues in protein-protein interaction interfaces using machine learning and a comparative analysis of the generalized sequence-
Visual Categorization With Bags of Keypoints Original Authors: G. Csurka, C.R. Dance, L. Fan, J. Willamowski, C. Bray ECCV Workshop on Statistical Learning.
CISC Machine Learning for Solving Systems Problems Presented by: Satyajeet Dept of Computer & Information Sciences University of Delaware Automatic.
Neural Text Categorizer for Exclusive Text Categorization Journal of Information Processing Systems, Vol.4, No.2, June 2008 Taeho Jo* 報告者 : 林昱志.
Ensemble Learning for Low-level Hardware-supported Malware Detection
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Iterative similarity based adaptation technique for Cross Domain text classification Under: Prof. Amitabha Mukherjee By: Narendra Roy Roll no: Group:
BotCop: An Online Botnet Traffic Classifier 鍾錫山 Jan. 4, 2010.
Data Mining and Decision Support
NTU & MSRA Ming-Feng Tsai
Competition II: Springleaf Sha Li (Team leader) Xiaoyan Chong, Minglu Ma, Yue Wang CAMCOS Fall 2015 San Jose State University.
Combining Evolutionary Information Extracted From Frequency Profiles With Sequence-based Kernels For Protein Remote Homology Detection Name: ZhuFangzhi.
PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao.
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
High Throughput and Programmable Online Traffic Classifier on FPGA Author: Da Tong, Lu Sun, Kiran Kumar Matam, Viktor Prasanna Publisher: FPGA 2013 Presenter:
Active Learning for Network Intrusion Detection ACM CCS 2009 Nico Görnitz, Technische Universität Berlin Marius Kloft, Technische Universität Berlin Konrad.
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
SUPERVISED AND UNSUPERVISED LEARNING Presentation by Ege Saygıner CENG 784.
Technische Universität München Yulia Gembarzhevskaya LARGE-SCALE MALWARE CLASSIFICATON USING RANDOM PROJECTIONS AND NEURAL NETWORKS Technische Universität.
Unveiling Zeus Automated Classification of Malware Samples Abedelaziz Mohaisen Omar Alrawi Verisign Inc, VA, USA Verisign Labs, VA, USA
Missing or Inapplicable: Treatment of Incomplete Continuous- Valued Features in Supervised Learning Prakash Mandayam Comar +, Lei Liu +, Sabyasachi Saha.
Learning to Detect and Classify Malicious Executables in the Wild by J
MALICIOUS URL DETECTION For Machine Learning Coursework
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
An Enhanced Support Vector Machine Model for Intrusion Detection
Introduction Feature Extraction Discussions Conclusions Results
Dieudo Mulamba November 2017
iSRD Spam Review Detection with Imbalanced Data Distributions
RHMD: Evasion-Resilient Hardware Malware Detectors
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
GANG: Detecting Fraudulent Users in OSNs
Modeling IDS using hybrid intelligent systems
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Spam Detection Using Support Vector Machine Presenting By Nan Mya Oo University of Computer Studies Taunggyi.
Presentation transcript:

Combining Supervised and Unsupervised Learning for Zero-Day Malware Detection © 2013 Narus, Inc. Prakash Comar 1 Lei Liu 1 Sabyasachi (Saby) Saha 2 Pang-Ning Tan 1 Antonio Nucci 2 1 Michigan State University, Michigan, USA 2 Narus, Inc., Sunnyvale, California, USA.

2 Introduction Increasing threats –Continuous and increased attacks on infrastructure –Threats to business, national security Huge financial stake (Conficker: 10 million machines, loss $9.1 Billion) Zeus: 3.6 million machines [HTML Injection] Koobface: 2.9 million machines [Social Networking Sites] TidServ: 1.5 million machines [ spam attachment] Attacks are becoming more advanced and sophisticated! Malware is … –Malicious software –Virus, Phishing, Spam, … © 2013 Narus, Inc.

3 Introduction (Contd.) Host vs Network based approaches Limitation of existing techniques –Signature-based approach Fails to detect zero-day attacks. Fails to detect threats with evolving capabilities such as metamorphic and polymorphic malwares. –Anomaly-based approach Producing high false alarm rate. –Supervised Learning based approach Poor performance on new and evolving malware Building classifier model is challenging due to diversity of malware classes, imbalanced distribution, data imperfection issues, etc. There is no Silver Bullet © 2013 Narus, Inc.

4 Our Goal Focus on Layer 3/4 features Threats often exhibit specific behavior in their layer-3/layer-4 flow level features –Even when the payload is encrypted Machine Learning based approach –Two level Supervised learning approach to detect malicious flows and further identify specific type –Combine unsupervised learning with supervised learning to address new class discovery problem © 2013 Narus, Inc.

5 Challenges Imbalanced class representation –Majority flows belong to a few dominant classes Missing values –The features used to characterize network flow may contain missing values (only 7% records with all features) Noise in the training data –Training data labeled as good by IDS may contain malwares New class discovery –Not all classes are present at the time of classifier is initially trained. © 2013 Narus, Inc.

6 System Architecture © 2013 Narus, Inc.

7 Proposed Framework Two level malware detection framework: Macro-level classifier –Used to isolate malicious flows from the non-malicious ones. Micro-level classifier –Further categorize the malicious flows into one of the pre- existing malware or new malware © 2013 Narus, Inc.

8 Methodology: Two-layered Learning Framework L1: Ensemble learning based binary classifier Classifies Unknown or Malicious Random Forest Classifier L2: One class SVM with tree-based kernel, along with probabilistic class profiling for specific malware class and novel class detection Combine Classification Process

9 Proposed Framework 1-Class SVM for Known Malware Detection:

10 Proposed Framework Tree based feature transformation

11 X = Y = 1 … 1 2 … 2 3 … 3 x 11 x 12 … x 1d x 21 x 22 … x 2d ………… x m1 x m2 … x md ………… ………… ………… x n1 x n2 … x nd Proposed Framework Example of tree based features with three classes C1 C2 C3

12 +1 … … … x 11 x 12 … x 1d x 21 x 22 … x 2d ………… x m1 x m2 … x md ………… ………… x n1 x n2 … x nd X Sample m out of n, f out of d X X … P trees

13 X Sample m out of n, f out of d X X … … +1 … x 11 x 12 … x 1d x 21 x 22 … x 2d ………… x m1 x m2 … x md ………… ………… x n1 x n2 … x nd P trees

14 X Sample m out of n, f out of d X X … … … +1 x 11 x 12 … x 1d x 21 x 22 … x 2d ………… x m1 x m2 … x md ………… ………… x n1 x n2 … x nd P trees

15 Proposed Framework Example of tree base feature transformation.

16 Proposed Framework Kernel matrix for 1-class SVM: –Existing kernel, like RBF or Polynomial kernel assume feature vector do not have missing value –Propose a weighted linear kernel matrix for 1- class SVM based on transformed tree-based features by minimizing the following objective function. –W ij is the model regularizer, G ij is a ground truth kernel, which defined as

17 Proposed Framework Probabilistic Profiling for New Class Discovery:

18 Experimental Evaluation Data: –Network flow data from Internet service provider in Asia, a subset of 108 flow features extracted. –Use IDS/IPS system to generate the class label for each flow by analyzing the payload. 38 different types of malware classes have been identified by IDS/IPS, including Conficker, Tidserv, Trojans, etc. The flows that unlabeled by IDS/IPS are assigned to “good” (unknown) category.

19 Experimental Evaluation Data:

20 Experimental Evaluation Comparison of Tree-based Feature Transformation against Missing Value Imputation –Original: data without any missing value treatment –OMI: Overall mean value of the feature across all the classes –CMI: mean value of the feature for the given class –LKNN: Local KNN Imputation

21 Experimental Evaluation Results Comparison at Macro-level Results Comparison at Micro-level –ROC curve for new malware detection

22 Experimental Evaluation Overall Results Comparison for detecting both known and new malware

23 Conclusion We proposed an effective malware detection framework based on statistical flow-level features Two level ML based classifier New class detection Encrypted data A tree based kernel for 1-class SVM was proposed to handle the data imperfection issue in network flow data

24 Future Works Extend the formulation to an online learning setting Develop a hierarchical multi-class learning method to enhance the testing efficiency when the number of malware classes becomes extremely large.