Towards building active defense for software applications

Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018. === This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. === Cataloged from student-s...

Full description

Bibliographic Details
Main Author: Perumal, Zara (Zara Alexandra)
Other Authors: Kalyan Veeramchaneni.
Format: Others
Language:English
Published: Massachusetts Institute of Technology 2018
Subjects:
Online Access:http://hdl.handle.net/1721.1/119583
id ndltd-MIT-oai-dspace.mit.edu-1721.1-119583
record_format oai_dc
spelling ndltd-MIT-oai-dspace.mit.edu-1721.1-1195832019-05-02T15:47:33Z Towards building active defense for software applications Perumal, Zara (Zara Alexandra) Kalyan Veeramchaneni. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018. This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. Cataloged from student-submitted PDF version of thesis. Includes bibliographical references (pages 85-88). Over the last few years, cyber attacks have become increasingly sophisticated. In an effort to defend themselves, corporations often look to machine learning, aiming to use the large amount of data collected on cyber attacks and software systems to defend systems at scale. Within the field of machine learning in cybersecurity, PDF malware is a popular target of study, as the difficulty of classifying malicious files makes it a continuously eective method of attack. The obstacles are many: Datasets change over time as attackers change their behavior, and the deployment of a malware detection system in a resource-constrained environment has minimum throughput requirements, meaning that an accurate but time-consuming classier cannot be deployed. Recent work has also shown how automated malicious file creation methods are being used to evade classication. Motivated by these challenges, we propose an active defender system to adapt to evasive PDF malware in a resource-constrained environment. We observe this system to improve the f₁ score from 0.17535 to 0.4562 over five stages of receiving PDF files that the system considers unlabeled. Furthermore, average classication time per le is low across all 5 stages, and is reduced from an average of 1.16908 seconds per le to 1.09649 seconds per le. Beyond classifying malware, we provide a general active defender framework that can be used to deploy decision systems for a variety of resource-constrained adversarial problems. by Zara Perumal. M. Eng. 2018-12-11T20:41:02Z 2018-12-11T20:41:02Z 2018 2018 Thesis http://hdl.handle.net/1721.1/119583 1076360094 eng MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. http://dspace.mit.edu/handle/1721.1/7582 94 pages application/pdf Massachusetts Institute of Technology
collection NDLTD
language English
format Others
sources NDLTD
topic Electrical Engineering and Computer Science.
spellingShingle Electrical Engineering and Computer Science.
Perumal, Zara (Zara Alexandra)
Towards building active defense for software applications
description Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018. === This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. === Cataloged from student-submitted PDF version of thesis. === Includes bibliographical references (pages 85-88). === Over the last few years, cyber attacks have become increasingly sophisticated. In an effort to defend themselves, corporations often look to machine learning, aiming to use the large amount of data collected on cyber attacks and software systems to defend systems at scale. Within the field of machine learning in cybersecurity, PDF malware is a popular target of study, as the difficulty of classifying malicious files makes it a continuously eective method of attack. The obstacles are many: Datasets change over time as attackers change their behavior, and the deployment of a malware detection system in a resource-constrained environment has minimum throughput requirements, meaning that an accurate but time-consuming classier cannot be deployed. Recent work has also shown how automated malicious file creation methods are being used to evade classication. Motivated by these challenges, we propose an active defender system to adapt to evasive PDF malware in a resource-constrained environment. We observe this system to improve the f₁ score from 0.17535 to 0.4562 over five stages of receiving PDF files that the system considers unlabeled. Furthermore, average classication time per le is low across all 5 stages, and is reduced from an average of 1.16908 seconds per le to 1.09649 seconds per le. Beyond classifying malware, we provide a general active defender framework that can be used to deploy decision systems for a variety of resource-constrained adversarial problems. === by Zara Perumal. === M. Eng.
author2 Kalyan Veeramchaneni.
author_facet Kalyan Veeramchaneni.
Perumal, Zara (Zara Alexandra)
author Perumal, Zara (Zara Alexandra)
author_sort Perumal, Zara (Zara Alexandra)
title Towards building active defense for software applications
title_short Towards building active defense for software applications
title_full Towards building active defense for software applications
title_fullStr Towards building active defense for software applications
title_full_unstemmed Towards building active defense for software applications
title_sort towards building active defense for software applications
publisher Massachusetts Institute of Technology
publishDate 2018
url http://hdl.handle.net/1721.1/119583
work_keys_str_mv AT perumalzarazaraalexandra towardsbuildingactivedefenseforsoftwareapplications
_version_ 1719028157484367872