Nested Multiple Instance Learning in Modelling of HTTP network traffic

02/10/2020
by   Tomáš Pevný, et al.
0

In many interesting cases, the application of machine learning is hindered by data having a complicated structure stimulated by a structured file-formats like JSONs, XMLs, or ProtoBuffers, which is non-trivial to convert to a vector / matrix. Moreover, since the structure frequently carries a semantic meaning, reflecting it in the machine learning model should improve the accuracy but more importantly it facilitates the explanation of decisions and the model. This paper demonstrates on the identification of infected computers in the computer network from their HTTP traffic, how to achieve this reflection using recent progress in multiple-instance learning. The proposed model is compared to complementary approaches from the prior art, the first relying on human-designed features and the second on automatically learned features through convolution neural networks. In a challenging scenario measuring accuracy only on unseen domains/malware families, the proposed model is superior to the prior art while providing a valuable feedback to the security researchers. We believe that the proposed framework will found applications elsewhere even beyond the field of security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/10/2020

High-Accuracy Malware Classification with a Malware-Optimized Deep Learning Model

Malware threats are a serious problem for computer security, and the abi...
research
06/27/2022

Multifamily Malware Models

When training a machine learning model, there is likely to be a tradeoff...
research
03/03/2020

DeepMAL – Deep Learning Models for Malware Traffic Detection and Classification

Robust network security systems are essential to prevent and mitigate th...
research
09/03/2021

Predicting Process Name from Network Data

The ability to identify applications based on the network data they gene...
research
09/23/2020

Dataset Optimization Strategies for MalwareTraffic Detection

Machine learning is rapidly becoming one of the most important technolog...
research
08/03/2021

HTTP2vec: Embedding of HTTP Requests for Detection of Anomalous Traffic

Hypertext transfer protocol (HTTP) is one of the most widely used protoc...

Please sign up or login with your details

Forgot password? Click here to reset