Up-high to down-low: Applying machine learning to an exploit database

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Today machine learning is primarily applied to low level features such as machine code and measurable behaviors. However, a great asset for exploit type classifications is public exploit databases. Unfortunately, these databases contain only meta-data (high level or abstract data) of these exploits. Considering that classification depends on the raw measurements found in the field, these databases have been overlooked. In this study, we offer two usages for these high level datasets and evaluate their performance. The first usage is classification by using meta-data as a bridge (supervised), and the second usage is the study of exploits’ relations using clustering and Self Organizing Maps (unsupervised). Both offer insights into exploit detection and can be used as a means to better define exploit classes.

Cite

CITATION STYLE

APA

Mirsky, Y., Cohen, N., & Shabtai, A. (2015). Up-high to down-low: Applying machine learning to an exploit database. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9522, pp. 184–200). Springer Verlag. https://doi.org/10.1007/978-3-319-27179-8_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free