DOC PREVIEW
UW-Madison ECE 539 - An ANN approach to identify malicious URLs

This preview shows page 1-2-3 out of 8 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 8 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1MotivationData Set (1)Data Set (2)Learning ModelExperiments (1)Experiment (2)Thank You…An ANN approach to identify malicious URLsECE 539 – Final ProjectJayneel GandhiMotivation•Prevent users from visiting malicious webpage•Lot of effort into reducing internet crimes•Try to learn which URL is malicious from different sources•Stop users from accessing such website in futureData Set (1)•Developed by SysNet group at University of California at San Diego•Posted at UCI Machine Learning Repository http://archive.ics.uci.edu/ml/datasets/URL+ReputationData Set (2)•Feature Space is made up of:–Lexical Features•Hostname•Primary Domain•Path Tokens–Host Based Features•WHOIS info•IP prefix•Geographical•Feature Vector (sparse): 3,231,961•Number of instances:2,396,130HUGE data set !!!Takes long time to run… in the range of 20-30 daysLearning ModelSource: Sysnet group webpage at University of California, San DiegoExperiments (1)•Data set organized as URLs visited over the period of 121 days (Day0-Day120)•Each day has roughly 15,000-40,000 URLs visited•I will only be running experiments on Day0 consisting of 16000 URLsExperiment (2)•Experiment 1–Use single perceptron model•Online learning possible•Has history of all the URLs visited is preserved•Experiment 2–Use Support Vector Machine (SVM)•Online learning not possible•Can only learn based on certain past history•Losses certain history with timeTHANK


View Full Document

UW-Madison ECE 539 - An ANN approach to identify malicious URLs

Documents in this Course
Load more
Download An ANN approach to identify malicious URLs
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view An ANN approach to identify malicious URLs and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view An ANN approach to identify malicious URLs 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?