M. Olalere, Mohd Taufik Abdullah, R. Mahmod, Azizol Abdullah
{"title":"恶意软件URL实时分类的判别词法特征识别与评价","authors":"M. Olalere, Mohd Taufik Abdullah, R. Mahmod, Azizol Abdullah","doi":"10.1109/ICCCE.2016.31","DOIUrl":null,"url":null,"abstract":"This study identifies and evaluates discriminative lexical features of malware URLs for building a real-time malware URL classification. The lexical features of malware URL are first identified from existing blacklisted malware URLs through manual examination. Feature identification is followed by studying the prevalence of these features on newly collected malware URLs through empirical analysis. Our empirical analysis revealed that attackers follow the same pattern in crafting malware URL. To evaluate the performance and effectiveness of these features, we applied a Support Vector Machine (SVM) classification algorithm on a dataset comprising of benign and malware URLs. By applying the WEKA data mining tool on our trained dataset, a 96.95 % accuracy was achieved with a low False Negative Rate (FNR) of 0.018 and a moderate False Positive Rate (FPR) of 0.046.","PeriodicalId":360454,"journal":{"name":"2016 International Conference on Computer and Communication Engineering (ICCCE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time Classification\",\"authors\":\"M. Olalere, Mohd Taufik Abdullah, R. Mahmod, Azizol Abdullah\",\"doi\":\"10.1109/ICCCE.2016.31\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study identifies and evaluates discriminative lexical features of malware URLs for building a real-time malware URL classification. The lexical features of malware URL are first identified from existing blacklisted malware URLs through manual examination. Feature identification is followed by studying the prevalence of these features on newly collected malware URLs through empirical analysis. Our empirical analysis revealed that attackers follow the same pattern in crafting malware URL. To evaluate the performance and effectiveness of these features, we applied a Support Vector Machine (SVM) classification algorithm on a dataset comprising of benign and malware URLs. By applying the WEKA data mining tool on our trained dataset, a 96.95 % accuracy was achieved with a low False Negative Rate (FNR) of 0.018 and a moderate False Positive Rate (FPR) of 0.046.\",\"PeriodicalId\":360454,\"journal\":{\"name\":\"2016 International Conference on Computer and Communication Engineering (ICCCE)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Computer and Communication Engineering (ICCCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCE.2016.31\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Computer and Communication Engineering (ICCCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCE.2016.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time Classification
This study identifies and evaluates discriminative lexical features of malware URLs for building a real-time malware URL classification. The lexical features of malware URL are first identified from existing blacklisted malware URLs through manual examination. Feature identification is followed by studying the prevalence of these features on newly collected malware URLs through empirical analysis. Our empirical analysis revealed that attackers follow the same pattern in crafting malware URL. To evaluate the performance and effectiveness of these features, we applied a Support Vector Machine (SVM) classification algorithm on a dataset comprising of benign and malware URLs. By applying the WEKA data mining tool on our trained dataset, a 96.95 % accuracy was achieved with a low False Negative Rate (FNR) of 0.018 and a moderate False Positive Rate (FPR) of 0.046.