首页> 外文学位 >Developing Profiles of Malware and User Behaviors Using Graph-Mining and Machine Learning Techniques.
【24h】

Developing Profiles of Malware and User Behaviors Using Graph-Mining and Machine Learning Techniques.

机译:使用图挖掘和机器学习技术开发恶意软件和用户行为的配置文件。

获取原文
获取原文并翻译 | 示例

摘要

The current fight between security experts and malware authors is an arms race. In this race, malware authors devise new attacks and exploits new vulnerabilities while the experts can only deflect the attacks and patch up the vulnerability after damage has been inflicted. Defending against miscreants is a difficult task precisely because experts do not know what attacks may come in the future. The ultimate goal of our work is to utilizing graph-mining and Machine Learning techniques to (a) develop profiles of user and malware behaviors and (b) detect anomalies and identify malicious actors. In this dissertation, we present three pieces of work that are aimed toward achieve that goal. The first is a graph-based approach designed to leverage P2P bots' behaviors to detect them when they lay dormant in the local network and wait for instructions from the botmasters. The second is a probabilistic algorithm based on the Stochastic Block Model that is designed to infer the group structure of users from their web browsing behaviors and leverage the group structure to detect when users in the network visit malicious websites. The third is an in-depth study of users' exposure to web-based malware from the point of view of the malicious websites and the users themselves, where we explore the methods with which web-based malware spread and investigate their characteristics and temporal behaviors.
机译:安全专家和恶意软件作者之间的当前斗争是军备竞赛。在这场竞赛中,恶意软件作者设计了新的攻击并利用了新的漏洞,而专家只能对攻击进行偏转并在造成损害后修补漏洞。防御恶意行为是一项艰巨的任务,正是因为专家不知道将来会发生什么攻击。我们工作的最终目标是利用图挖掘和机器学习技术来(a)开发用户和恶意软件行为的概况以及(b)检测异常并识别恶意行为者。在这篇论文中,我们提出了旨在实现该目标的三项工作。第一种是基于图的方法,旨在利用P2P僵尸程序的行为将其置于本地网络中并等待僵尸程序主的指令后对其进行检测。第二种是基于随机块模型的概率算法,该算法旨在根据用户的网络浏览行为来推断用户的分组结构,并利用该分组结构来检测网络中的用户何时访问恶意网站。第三个是从恶意网站和用户本身的角度深入研究了用户对基于Web的恶意软件的暴露程度,我们在其中探索了基于Web的恶意软件传播的方法,并调查了其特征和时间行为。 。

著录项

  • 作者

    Hang, Huy Nhut.;

  • 作者单位

    University of California, Riverside.;

  • 授予单位 University of California, Riverside.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2014
  • 页码 99 p.
  • 总页数 99
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号