Главная
Study mode:
on
1
Introduction
2
Overview
3
HTTP detection modules
4
Put URL Under Microscope
5
URL Parameter Features
6
Transforming parameters
7
ML Methods Comparison
8
A comparison of the clustering algorithms
9
Clustering Method
10
Cross-Family Cluster Merging
11
Example of Detection Result
12
The better security arch.
13
Black Hat Sound Bytes
Description:
Explore a novel malware detection method based on URL behavioral modeling in this 51-minute Black Hat conference talk. Learn about network-level behavioral signature/modeling advantages in malware detection compared to traditional AV signatures and system-level behavioral models. Discover how this approach leverages common code re-use practices among various malware types. Delve into HTTP detection modules, URL parameter features, and machine learning methods for clustering algorithms. Examine cross-family cluster merging techniques and analyze detection result examples. Gain insights into building a better security architecture and hear key Black Hat sound bites from presenters Hao Dong and Jin Shang.

Beyond the Blacklists - Detecting Malicious URL Through Machine Learning

Black Hat
Add to list
0:00 / 0:00