YoVDO

Beyond the Blacklists - Detecting Malicious URL Through Machine Learning

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Machine Learning Courses Malware Analysis Courses Clustering Algorithms Courses

Course Description

Overview

Explore a novel malware detection method based on URL behavioral modeling in this 51-minute Black Hat conference talk. Learn about network-level behavioral signature/modeling advantages in malware detection compared to traditional AV signatures and system-level behavioral models. Discover how this approach leverages common code re-use practices among various malware types. Delve into HTTP detection modules, URL parameter features, and machine learning methods for clustering algorithms. Examine cross-family cluster merging techniques and analyze detection result examples. Gain insights into building a better security architecture and hear key Black Hat sound bites from presenters Hao Dong and Jin Shang.

Syllabus

Introduction
Overview
HTTP detection modules
Put URL Under Microscope
URL Parameter Features
Transforming parameters
ML Methods Comparison
A comparison of the clustering algorithms
Clustering Method
Cross-Family Cluster Merging
Example of Detection Result
The better security arch.
Black Hat Sound Bytes


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network