JSObfusDetector: A Binary PSO-based One-Class Classifier Ensemble to Detect Obfuscated JavaScript Code

Size: px
Start display at page:

Download "JSObfusDetector: A Binary PSO-based One-Class Classifier Ensemble to Detect Obfuscated JavaScript Code"

Transcription

1 2015 International Symposium on Artificial Intelligence and Signal Processing (AISP) JSObfusDetector: A Binary PSO-based One-Class Classifier Ensemble to Detect Obfuscated JavaScript Code Mehran Jodavi, Mahdi Abadi, and Elham Parhizkar Department of Electrical and Computer Engineering Tarbiat Modares University Tehran, Iran {mehran.jodavi, abadi, e.parhizkar}@modares.ac.ir Abstract JavaScript code obfuscation has become a major technique used by malware writers to evade static analysis techniques. Over the past years, a number of dynamic analysis techniques have been proposed to detect obfuscated malicious JavaScript code at runtime. However, because of their runtime overheads, these techniques are slow and thus not widely used in practice. On the other hand, since a large quantity of benign JavaScript code is obfuscated to protect intellectual property, it is not effective to use the intrinsic features of obfuscated JavaScript code for static analysis purposes. Therefore, we are forced to distinguish between obfuscated and non-obfuscated JavaScript code so that we can devise an efficient and effective analysis technique to detect malicious JavaScript code. In this paper, we address this issue by presenting JSObfusDetector, a novel oneclass classifier ensemble to detect obfuscated JavaScript code. To construct the classifier ensemble, we apply a binary particle swarm optimization (PSO) algorithm, called ParticlePruner, on an initial ensemble of one-class SVM classifiers to find a subensemble whose members are both accurate and have diversity in their outputs. We evaluate JSObfusDetector using a dataset of obfuscated and non-obfuscated JavaScript code. The experimental results show that JSObfusDetector can achieve about 97% precision, 91% recall, and 94% F-measure. Keywords obfuscated JavaScript code; static analysis; classifier ensemble; one-class classifier; ensemble pruning; particle swarm optimization I. INTRODUCTION Generally, code obfuscation is the deliberate act of transforming readable code into equivalent obfuscated code that is more difficult to understand [1]. It is commonly used by software developers to protect the intellectual property of their code or by malware writers to evade signature-based detection systems. JavaScript is a dynamic scripting language, which means that the developers can generate JavaScript code at runtime. However, the dynamic nature of JavaScript is often misused by malware writers to create malicious code. Therefore, a number of static analysis techniques [2], [3] have been proposed to detect malicious JavaScript code. While being fast and effective, these techniques have limited success when dealing with obfuscated JavaScript code. Due to this limitation, a number of dynamic analysis techniques [4], [5] have been developed to detect obfuscated malicious JavaScript code at runtime. However, because of their runtime overheads, these techniques are slow and thus not widely used in practice. On the other hand, the mere presence of obfuscated JavaScript code does not indicate the presence of any malicious content. The reason is that there is plenty of benign JavaScript code that has been intentionally obfuscated to protect intellectual property. Moreover, there are a lot of free obfuscators available that simply transform JavaScript code into equivalent obfuscated one, making the use of obfuscation in benign and malicious JavaScript code more popular as ever. According to the above discussion, if we are given a piece of non-obfuscated JavaScript code, it is reasonable that we use lightweight static techniques to analyze it. On the other hand, for obfuscated JavaScript code, it is better to use dynamic analysis techniques. As a result, we need to distinguish between obfuscated and non-obfuscated JavaScript code so that we can devise an efficient and effective analysis technique to detect malicious JavaScript code. In this paper, we address this issue by presenting JSObfusDetector, a one-class classifier ensemble to determine whether or not a piece of JavaScript code has been obfuscated for any purpose, malicious or otherwise. JSObfusDetector aims to detect obfuscated JavaScript code based on major changes in its structural and lexical aspects. JSObfusDetector consists of two main steps: training and detection. In the training step, we use a set of non-obfuscated JavaScript code blocks to construct an initial ensemble of oneclass SVM classifiers. We then prune the classifier ensemble using a novel binary particle swarm optimization (PSO) algorithm to find a near-optimal sub-ensemble. The goal is to reduce the size of the initial ensemble by selecting only a subset of the one-class SVM classifiers that are both accurate and have diversity in their outputs. In the detection step, we combine the outputs of chosen one-class SVM classifiers in the sub-ensemble using the majority voting rule to classify given JavaScript code blocks as obfuscated or non-obfuscated. Our approach is motivated by the observation that the fusion of multiple one-class classifiers can improve the classification accuracy [6]. The rest of the paper is organized as follows. In Section II, /15/$ IEEE 322

2 we describe some of the common JavaScript obfuscation techniques. In Section III, we present JSObfusDetector and experimentally evaluate it in Section IV. Finally, we discuss related work in Section V and conclude the paper in Section VI. II. BACKGROUND In this section, we first describe some of the most popular JavaScript obfuscation techniques and then give a brief overview of the binary PSO algorithm. A. JavaScript Obfuscation Techniques Obfuscation techniques are heavily used in benign and malicious JavaScript code, with the aim of making JavaScript code more difficult to understand to protect intellectual property or evade signature-based detection. In the following subsections, we briefly discuss the major obfuscation techniques being used in wild [7]. 1) Data Obfuscation. JavaScript code may be obfuscated by splitting its strings into multiple variables or substrings and concatenating them later, perhaps by using the document.write or eval functions (see Fig. 1). var mystr = "document.write('my Code')"; eval(mystr); (a) original code Fig. 1. An example of data obfuscation. var yq = "de')"; var sq = "doc"; var sm = "ument"; var kw = "('My Co"; var mystr = sq + sm + ".write" + kw + yq; eval(mystr); (b) obfuscated code 2) Encoding Obfuscation. A general technique for JavaScript obfuscation is to convert characters into their ASCII, Unicode, or hexadecimal values. Fig. 2 shows a demonstration of using Unicode values to obfuscate the string "My Code". document.write("\u004d\u0079\u0020\u0043\u006f\u0064\u0065"); Fig. 2. An example of encoding obfuscation. 3) Randomization Obfuscation. Randomization obfuscation is as simple as randomly inserting or changing some elements of code without changing the semantics at all. Variable and whitespace randomization [8] are common techniques in this category. Fig. 3 gives an example of variable randomization. function myfunc(str) { document.write(str); } var mystr = "My Code"; myfunc(mystr); (a) original code Fig. 3. An example of randomization obfuscation. function msfrt23kjgty(zs12mnjy) { document.write(zs12mnjy); } var nbuqmazsuikh = "My Code"; msfrt23kjgty(nbuqmazsuikh); (b) obfuscated code B. Binary PSO Particle swarm optimization (PSO) [9] is a population based stochastic optimization inspired by social behavior of flocks of birds when they are searching for food. In PSO, the potential solutions, known as particles, fly through the problem space exploring for better regions. Each particle in the swarm has a current position, a velocity, and a personal best position. The performance of the particle positions is measured using a predefined fitness function, which is related to the problem to be solved. Let be the position of the particle at the iteration, its personal best position at this iteration, denoted by, is updated as 1 if 1, (1) otherwise, where is the fitness function to be maximized. The best personal best position in the swarm is known as the global best position and is denoted by. Note that, throughout the paper, we use boldface to distinguish vectors from scalars. For the binary PSO [10], the elements of and can only take the values 0 and 1. The particle updates its current velocity and position using the following equation: 1, 1 0 if sig 1, 1 otherwise, where 1 and 1 are the velocity and position updated for the th dimension, 1,2,,. Also,,, and are random values in the range [0,1]. In addition, and are the acceleration constants and sig is a sigmoid function between 0 and 1. Using the sigmoid function, the velocity is interpreted as a probability to change a bit from 0 to 1 or from 1 to 0 when updating the position of particles. III. JSOBFUSDETECTOR In this section, we present JSObfusDetector, a binary PSObased one-class classifier ensemble to distinguish between obfuscated and non-obfuscated JavaScript code. JSObfusDetector is motivated by the observation that the performance of an ensemble that is composed of many base classifiers could be better than any of the base classifiers [6]. It consists of two main steps: training and detection. In the training step, we build a profile of non-obfuscated JavaScript code. To do so, we take as input a set of non-obfuscated JavaScript code blocks and extract an abstract syntax tree (AST) for each block in the set. We then traverse the ASTs to generate a set of feature vectors that are subsequently used to construct an initial ensemble of one-class SVM classifiers. Each feature vector includes values for features describing structural and lexical aspects of a JavaScript code block. We then use a binary PSO algorithm, called ParticlePruner, to find a near-optimal sub-ensemble that achieves the maximum possible fitness function. The goal is to reduce the size of by selecting only a subset of the one-class SVM classifiers that are both accurate and have diversity in their outputs. In the detection step, we extract a feature vector from each new JavaScript code block and apply it to all one-class SVM classifiers in. We then combine the outputs of these classifiers using the majority voting rule to (2) (3) 323

3 determine whether it is obfuscated or not. In the following subsections, we describe in detail what features are extracted from JavaScript code blocks and how the initial one-class classifier ensemble is pruned. A. Structural and Lexical Features As previously mentioned, the three most popular JavaScript obfuscation techniques, in order of popularity, are data, encoding, and randomization obfuscation. The obfuscation techniques can be easily applied to any JavaScript code and only change its structural and lexical aspects. Considering these changes, we present the following features to detect obfuscated JavaScript code: 1) Number of String Definitions. In order to perform data obfuscation, we can split a string into multiple substrings and concatenate them later. Most obfuscated JavaScript code makes use of data obfuscation to invisible particular strings or makes use of it along with dangerous functions like eval to generate code at runtime, resulting in an increased number of string definitions. 2) Rate of String Operations. An important side effect of data and encoding obfuscation techniques is the overuse of string operations, tending to an unusually large number of string operations compared with other operations. The reason is that these techniques widely generate code from strings at runtime by calling string functions such as fromcharcode, charat, substring, and so on. 3) Maximum Length of Strings and Ratio of Long Strings. It is common for encoding obfuscation techniques to convert characters in a string into their ASCII or Unicode values, causing the length of the string to increase. 4) Number of Dynamic Code Evaluations. Dynamic code evaluation plays an important role in data and encoding obfuscation techniques. The goal is to evaluate a string as code at runtime. JavaScript supports dynamic code evaluation using functions such as eval and settimeout. 5) Minimum and Maximum Entropy of Strings. Encoding obfuscation techniques usually transform all characters of a string in order to avoid pattern-matching detection, causing changes in the probability distribution of characters. B. ParticlePruner Given an initial ensemble of one-class SVM classifiers, we apply ParticlePruner on it to reduce its size. In this algorithm, we first initialize a swarm of particles. The position of each particle is represented by a binary vector of length :,,,, (4) where is the total number of one-class SVM classifiers in. Actually, indicates a sub-ensemble of one-class SVM classifiers in. If 1, this means that the one-class SVM classifier is part of. Otherwise, it means that is not part of the sub-ensemble: 1. (5) We then iteratively perform the following steps until some termination condition (e.g., the maximum number of fitness evaluations) is reached: during each iteration, we update the personal best position of each particle using (1). Next, we determine the global best position from the entire swarm by selecting the best personal best position. Subsequently, we update the velocity 1 and the position 1 of each particle using (2) and (3). We use two measures to evaluate the overall fitness of the particle positions, namely and. Let be a particle position. and are calculated as the true negative rate and the non-pairwise diversity of, where is the sub-ensemble indicated by. Given a validation dataset of feature vectors generated from nonobfuscated JavaScript code blocks, we calculate as 1 l, (6) where is the number of feature vectors in and l is an indicator function whose value is 1 if the subensemble correctly classifies an input feature vector belonging to and 0 otherwise: l 1 Ω 2, 0 otherwise, where is the number of one-class SVM classifiers in, and Ω is an indicator function whose value is 1 if the oneclass SVM classifier classify an input feature vector as belonging to the non-obfuscated class and 0 otherwise: Ω 1, (8) 0 otherwise. Actually, we use the majority voting rule to combine the outputs of one-class SVM classifiers in. Subsequently, we calculate as 1, (9) 1 1 where is the average true negative rate of one-class SVM classifiers in : (7) 1, (10) where is the proportion of one-class SVM classifiers in that correctly classify a feature vector : 1 Ω. (11) In fact, is a non-pairwise diversity measure based on the Kappa inter-rater agreement [11]. If there is no variation in the values of for all feature vectors, then there is more diversity among the one-class SVM classifiers in. In this case, may be seen to assume its maximum value of 1. On the other hand, if the values of is 0 or 1 for all feature vectors, then there is no diversity 324

4 among the one-class SVM classifiers in and may be seen to assume its minimum value of 0. Finally, we calculate the fitness of as the weighted average of and : 1, (12) where 0,1 is a user-defined parameter. Note that to calculate and, we only need the information of the non-obfuscated class. IV. EXPERIMENTAL EVALUATION In this section, we experimentally evaluate the performance of JSObfusDetector using a dataset of obfuscated and nonobfuscated JavaScript code blocks. A. Experimental Setup The dataset used in our experiments was consisted of 400 obfuscated and 1500 non-obfuscated JavaScript code blocks. To create the dataset, we captured the main web pages of the Alexa top 1000 websites [12] and selected the JavaScript code blocks of these web pages that were not suspected of being obfuscated. Moreover, we collected a number of benign and malicious JavaScript code blocks and obfuscated them using free online JavaScript obfuscators, such as [13], [14], [15]. In addition, we enriched the resulting dataset with some obfuscated JavaScript code blocks from [16]. To extract the AST of each block in the dataset, we used Rhino [17], which is a JavaScript engine developed in Java and managed by the Mozilla Foundation as open source software. When generating feature vectors from the obtained ASTs, we considered a string as long if its length was greater than a certain threshold which was empirically set to 500. We divided our dataset into training, validation, and testing datasets. The training and validation datasets consisted of 900 and 300 non-obfuscated JavaScript code blocks and were respectively used for constructing and pruning an initial oneclass classifier ensemble. The remaining non-obfuscated JavaScript code blocks and all obfuscated ones were used for testing purposes. For the purpose of our experiments, we constructed an initial ensemble of multiple one-class SVM classifiers using bagging [18] and the random subspace method [19]. In bagging, we randomly sampled the training dataset times with replacement, resulting in different training datasets with sizes equal to the original training dataset. In random subspace method, we independently trained one-class SVM classifiers on feature subsets of size 5, randomly selected from the training datasets produced by bagging. To implement the one-class SVM classifiers, we used the LIBSVM package [20]. We performed 5-fold cross-validation with grid search to tune the oneclass SVM parameters. We pruned the initial ensemble using ParticlePruner. It has two main control parameters: the number of particles ( ) and the maximum number of iterations ( ). For all experiments, we set to 50 and to 500. All reported results are averages of 30 runs. B. Performance Measures To evaluate the performance of JSObfusDetector, we used the standard measures of precision ( ), recall ( ), and F- measure ( ):,, (13) 2, where is the number of correctly classified obfuscated JavaScript code blocks, is the number of incorrectly classified non-obfuscated JavaScript code blocks, and is the number of incorrectly classified obfuscated JavaScript code blocks. C. Experimental Results We performed several experiments to analyze how the initial ensemble size,, affects the precision, recall, and F- measure of JSObfusDetector. By the initial ensemble size, we mean the total number of one-class SVM classifiers in the initial ensemble. Table I shows the obtained results for different values of. The average ensemble size after pruning is denoted by. Clearly, with an increase in, all the performance measures increase. However, a higher value of results in a higher value of and thus incurs more computational cost in the detection step. From the table, we can make a trade-off between the classification performance and the pruned ensemble size by setting 40. TABLE I. EFFECT OF ON THE PRECISION, RECALL, AND F-MEASURE OF JSOBFUSDETECTOR Precision Recall F-measure Next, to evaluate the impact of ParticlePruner on the performance of JSObfusDetector, we implemented another variant of it, called GenPruner. It should be mentioned that GenPruner Precision Recall F-measure ParticlePruner GenPruner Fig. 4. Comparison of ParticlePruner and GenPruner in terms of precision, recall, and F-measure. 325

5 is similar to ParticlePruner, with this difference that it uses standard genetic algorithm (SGA) to prune the initial ensemble. On the basis of the results in Fig. 4, we find that ParticlePruner outperforms GenPruner in terms of precision, recall, and F- measure. Therefore, we conclude that ParticlePruner can better explore the ensemble space and find a near-optimal subensemble. After that, we designed some experiments to evaluate the impact of various features in our feature set on the classification performance of JSObfusDetector. For this purpose, we first obtained the ranking of the features using three common feature ranking measures, namely information gain (IG), chisquare (CS), and correlation (CR). We then evaluated the classification performance of JSObfusDetector for 7 nested subsets of features. The first subset contained the top ranked feature; the second subset contained the top two ranked features, and so on. The last subset contained all features. The results in Table II show that the length-based features (maximum length of strings and ratio of long strings) are highly ranked in all three feature ranking measures. The further analysis of our dataset showed that less than 9% of explicitly defined strings in nonobfuscated JavaScript code blocks were long, while this value was more than 40% for obfuscated JavaScript code blocks. However, as shown in Table III, these two features alone are not enough for achieving a high classification performance and so we need to consider all features together to achieve good performance. Finally, we performed an experiment to compare the classification performance of JSObfusDetector with that of the best individual one-class SVM classifier. The results are shown in Fig. 5. As we expect, JSObfusDetector achieves the better precision, recall, and F-measure. Therefore, we conclude that oneclass classifier ensembles can be considered as an effective tool to detect obfuscated JavaScript code. TABLE II. RANKING OF THE FEATURES USING THREE COMMON FEATURE RANKING MEASURES Feature IG CS CR Number of String Definitions Rate of String Operations Maximum Length of Strings Ratio of Long Strings Number of Dynamic Code Evaluations Minimum Entropy of Strings Maximum Entropy of Strings TABLE III. PRECISION, RECALL, AND F-MEASURE OF JSOBFUSDETECTOR FOR DIFFERENT SUBSETS OF FEATURES Feature Subset Precision Recall F-measure , ,, ,,, ,,,, ,,,,, ,,,,,, Precision Recall F-measure JSObfusDetector Best Classifier Fig. 5. Comparison of JSObfusDetector and the best individual one-class SVM classifier in terms of precision, recall, and F-measure. V. RELATED WORK Most related work in the literature assumes that obfuscated JavaScript code is also malicious. For example, Choi et al. [22] proposed a technique to detect obfuscated strings in malicious web pages. Cova et al. [23] presented an approach for detecting malicious JavaScript code that relies on dynamic analysis and anomaly detection. They defined three features to dynamically identify the operations performed during the deobfuscation step. Canali et al. [24] introduced Prophiler, a filtering system that uses static analysis to distinguish between benign and malicious web pages. Prophiler uses some features derived from the HTML contents, associated JavaScript code, and URL of each web page to build detection models. They considered obfuscated JavaScript code within their design of features. However, their features are inadequate to effectively detect all JavaScript obfuscation techniques developed by malware writers. Curtsinger et al. [2] proposed ZOZZLE, a mostly static detector that is able to examine a web page and decide if it contains a heap spraying JavaScript malware. While their analysis is entirely static, ZOZZLE has a runtime component to address the issue of JavaScript obfuscation. In order to deal with obfuscation, ZOZZLE has integrated with the web browser s JavaScript engine to collect and process JavaScript code that is created at runtime. Xu et al. [3] presented a function invocation based analysis technique that leverages the combination of static analysis and run-time inspection to detect obfuscated malicious JavaScript code. Their underlying assumption is that obfuscated malicious JavaScript code has to be deobfuscated before fulfilling its malicious intent, and in JavaScript, the deobfuscation process has to invoke certain functions. Based on this assumption, they identify the function invocations that can be potentially involved in obfuscated malicious JavaScript code. However, dynamic characteristics of JavaScript allow developers to manipulate basic techniques of code obfuscation in infinite ways and obfuscate their JavaScript code in various forms. Some researchers have considered JavaScript code obfuscation as a self-determining problem and tried to detect any piece of obfuscated JavaScript code. Kaplan et al. [21] presented NOFUS, a tool that automatically determines whether a piece of JavaScript code has been obfuscated for any purpose, malicious or otherwise. NOFUS follows its previous work, ZOZZLE 326

6 [2], which uses Bayesian classification of hierarchical features of the JavaScript AST to identify syntax elements. It has been shown that both ZOZZLE and NOFUS cannot be considered as a comprehensive solution for the mentioned problem [1], because they consider very specific categories of obfuscated JavaScript code. Taharwa et al. [1] presented JSOD, a static analysis solution to detect obfuscated JavaScript code. Although there exists some resemblance in manner between JSOD and NOFUS, but unlike NOFUS which extracts flat features from AST, JSOD retains contextual information to handle a general form of JavaScript obfuscation techniques, known as readable obfuscation. However, it can be considered as a supervised obfuscation detector in which a Bayesian classifier is trained using context-based features that are extracted from the AST of JavaScript code. Therefore, similar to other supervised detectors, JSOD cannot handle new JavaScript obfuscation techniques. We have previously shown that by using our structural and lexical features we can devise an efficient semi-supervised JavaScript obfuscation detector that only uses non-obfuscated pieces of JavaScript code for training. Therefore, as a matter of fact, our obfuscation detector is able to handle both known and unknown JavaScript obfuscation techniques. VI. CONCLUSIONS JavaScript code is often obfuscated by software developers and malware writers to make its understanding more difficult, and thus, to conceal its purpose. In this paper, we presented JSObfusDetector, a novel approach based on the idea of ensemble learning to detect obfuscated JavaScript code. At first, JSObfusDetector constructs an initial ensemble of one-class SVM classifiers and then applies a binary PSO algorithm, called ParticlePruner, on it to find a sub-ensemble whose members are both accurate and have diversity in their outputs. The results of our experiments on a dataset of obfuscated and nonobfuscated JavaScript code demonstrate that JSObfusDetector can achieve high precision and recall. Therefore, it can be considered as an effective tool to detect obfuscated JavaScript code. While most related work focuses on detecting obfuscated malicious JavaScript code, JSObfusDetector tries to distinguish between obfuscated and non-obfuscated JavaScript code so that we can devise an efficient and effective analysis technique to detect malicious JavaScript code. REFERENCES [1] I. A. AL-Taharwa, H.-M. Lee, A. B. Jeng, K.-P. Wu, C.-S. Ho, and S.- M. Chen, JSOD: JavaScript obfuscation detector, Security and Communication Networks, [2] C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert, Zozzle: Lowoverhead mostly static JavaScript malware detection, in Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, USA, [3] W. Xu, F. Zhang, and S. Zhu, JStill: Mostly static detection of obfuscated malicious JavaScript code, in Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, [4] G. K. Jayasinghe, J. Shane Culpepper, and P. Bertok, Efficient and effective realtime prediction of drive-by download attacks, Journal of Network and Computer Applications, vol. 30, pp , [5] I. Corona, D. Maiorca, D. Ariu, and G. Giacinto, Lux0R: Detection of malicious PDF-embedded JavaScript code through discriminant analysis of API references, in Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security, Scottsdale, AZ, USA, [6] G. Giacinto, R. Perdisci, M. Del Rio, and F. Roli, Intrusion detection in computer networks by a modular ensemble of one-class classifiers, Information Fusion, vol. 9, no. 1, pp , [7] G. Lu and S. Debray, Automatic simplification of obfuscated JavaScript code: A semantics-based approach, in Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, Gaithersburg, MD, USA, [8] W. Xu, F. Zhang, and S. Zhu, The power of obfuscation techniques in malicious JavaScript code: A measurement study, in Proceedings of the th International Conference on Malicious and Unwanted Software, Fajardo, PR, USA, [9] R. Poli, J. Kennedy, and T. Blackwell, Particle swarm optimization, Swarm Intelligence, vol. 1, no. 1, pp , [10] J. Kennedy, and R. C. Eberhart, A discrete binary version of the particle swarm algorithm, in Proceedings of the 1997 IEEE International Conference on Systems, Man, and Cybernetics, Orlando, FL, USA, [11] L. I. Kuncheva and C. J. Whitaker, Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy, Machine Learning, vol. 51, no. 2, pp , [12] Alexa Top Global Sites. Available from: [Accessed December 2014]. [13] Free Online JavaScript and HTML Obfuscator. Available from: [Accessed December 2014]. [14] Free JavaScript Obfuscator. Available from: obfuscator.com [Accessed December 2014]. [15] JavaScript Obfuscator/Encoder. Available from: jsobfuscate.com [Accessed December 2014]. [16] M. Mansoori, I. Welch, and Q. Fu, YALIH, yet another low interaction honeyclient, in Proceedings of the 12th Australasian Information Security Conference, Auckland, New Zealand, [17] Rhino - JavaScript Engine, Mozilla Developer Network. Available from: [Accessed December 2014]. [18] J. Quinlan, Bagging, boosting, and C4.5, in Proceedings of the 13th National Conference on Artificial Intelligence, Portland, OR, USA, [19] H. Tin Kam, The random subspace method for constructing decision forests, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp , [20] C.-C. Chang and C.-J. Lin, LIBSVM: A library for support vector machines, ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, [21] S. Kaplan, B. Livshits, B. Zorn, C. Seifert, and C. Curtsinger, "NOFUS: Automatically Detecting" + string.fromcharcode(32) + "ObFuSCateD".tolowercase() + "javascript code", Technical Report, Microsoft Research, [22] Y.-H. Choi, T.-G. Kim, and S.-J. Choi. Automatic detection for JavaScript obfuscation attacks in web pages through string pattern analysis, International Journal of Security and Its Applications, vol. 4, no. 2, pp , [23] M. Cova, C. Kruegel, and G. Vigna, Detection and analysis of driveby-download attacks and malicious JavaScript code, in Proceedings of the 19th International Conference on World Wide Web, Raleigh, NC, USA, [24] D. Canali, M. Cova, G. Vigna, and C. Kruegel, Prophiler: A fast filter for the large-scale detection of malicious web pages, in Proceedings of the 20th International Conference on World Wide Web, Hyderabad, India,

Detection of Cross Site Scripting Attack and Malicious Obfuscated Javascript Code

Detection of Cross Site Scripting Attack and Malicious Obfuscated Javascript Code International Journal of Engineering Research in Computer Science and Engineering Detection of Cross Site Scripting Attack and Malicious Obfuscated Javascript Code [1] Vrushali S. Bari [2] Prof. Nitin

More information

Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls

Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls Alireza Gorji Tarbiat Modares University Tehran, Iran alireza.gorji@modares.ac.ir Mahdi Abadi Tarbiat Modares University

More information

Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites

Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites R. Krishnaveni, C. Chellappan, and R. Dhanalakshmi Department of Computer Science & Engineering, Anna University,

More information

JSOD: JavaScript obfuscation detector

JSOD: JavaScript obfuscation detector SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8:1092 1107 Published online 1 July 2014 in Wiley Online Library (wileyonlinelibrary.com)..1064 RESEARCH ARTICLE JSOD: JavaScript obfuscation

More information

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications Davide Ariu, Igino Corona, Giorgio Giacinto, Fabio Roli University of Cagliari, Dept. of Electrical and

More information

Improving the Random Forest Algorithm by Randomly Varying the Size of the Bootstrap Samples for Low Dimensional Data Sets

Improving the Random Forest Algorithm by Randomly Varying the Size of the Bootstrap Samples for Low Dimensional Data Sets Improving the Random Forest Algorithm by Randomly Varying the Size of the Bootstrap Samples for Low Dimensional Data Sets Md Nasim Adnan and Md Zahidul Islam Centre for Research in Complex Systems (CRiCS)

More information

Argha Roy* Dept. of CSE Netaji Subhash Engg. College West Bengal, India.

Argha Roy* Dept. of CSE Netaji Subhash Engg. College West Bengal, India. Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Training Artificial

More information

An improved PID neural network controller for long time delay systems using particle swarm optimization algorithm

An improved PID neural network controller for long time delay systems using particle swarm optimization algorithm An improved PID neural network controller for long time delay systems using particle swarm optimization algorithm A. Lari, A. Khosravi and A. Alfi Faculty of Electrical and Computer Engineering, Noushirvani

More information

Inertia Weight. v i = ωv i +φ 1 R(0,1)(p i x i )+φ 2 R(0,1)(p g x i ) The new velocity update equation:

Inertia Weight. v i = ωv i +φ 1 R(0,1)(p i x i )+φ 2 R(0,1)(p g x i ) The new velocity update equation: Convergence of PSO The velocity update equation: v i = v i +φ 1 R(0,1)(p i x i )+φ 2 R(0,1)(p g x i ) for some values of φ 1 and φ 2 the velocity grows without bound can bound velocity to range [ V max,v

More information

GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM

GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM Journal of Al-Nahrain University Vol.10(2), December, 2007, pp.172-177 Science GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM * Azhar W. Hammad, ** Dr. Ban N. Thannoon Al-Nahrain

More information

SNS College of Technology, Coimbatore, India

SNS College of Technology, Coimbatore, India Support Vector Machine: An efficient classifier for Method Level Bug Prediction using Information Gain 1 M.Vaijayanthi and 2 M. Nithya, 1,2 Assistant Professor, Department of Computer Science and Engineering,

More information

[Rajebhosale*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

[Rajebhosale*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A FILTER FOR ANALYSIS AND DETECTION OF MALICIOUS WEB PAGES Prof. SagarRajebhosale*, Mr.Abhimanyu Bhor, Ms.Tejashree Desai, Ms.

More information

Malicious JavaScript Detection using Statistical Language Model

Malicious JavaScript Detection using Statistical Language Model San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 5-25-2016 Malicious JavaScript Detection using Statistical Language Model Anumeha Shah San Jose

More information

Detecting Malicious Web Links and Identifying Their Attack Types

Detecting Malicious Web Links and Identifying Their Attack Types Detecting Malicious Web Links and Identifying Their Attack Types Anti-Spam Team Cellopoint July 3, 2013 Introduction References A great effort has been directed towards detection of malicious URLs Blacklisting

More information

Particle Swarm Optimization applied to Pattern Recognition

Particle Swarm Optimization applied to Pattern Recognition Particle Swarm Optimization applied to Pattern Recognition by Abel Mengistu Advisor: Dr. Raheel Ahmad CS Senior Research 2011 Manchester College May, 2011-1 - Table of Contents Introduction... - 3 - Objectives...

More information

Particle Swarm Optimization

Particle Swarm Optimization Particle Swarm Optimization Gonçalo Pereira INESC-ID and Instituto Superior Técnico Porto Salvo, Portugal gpereira@gaips.inesc-id.pt April 15, 2011 1 What is it? Particle Swarm Optimization is an algorithm

More information

Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis

Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis Davide Maiorca 1, Paolo Russu 1, Igino Corona 1, Battista Biggio 1, and Giorgio Giacinto 1 Department of Electrical

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization Cell-to-switch assignment in cellular networks using barebones particle swarm optimization Sotirios K. Goudos a), Konstantinos B. Baltzis, Christos Bachtsevanidis, and John N. Sahalos RadioCommunications

More information

Image Compression: An Artificial Neural Network Approach

Image Compression: An Artificial Neural Network Approach Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and

More information

CSI5387: Data Mining Project

CSI5387: Data Mining Project CSI5387: Data Mining Project Terri Oda April 14, 2008 1 Introduction Web pages have become more like applications that documents. Not only do they provide dynamic content, they also allow users to play

More information

Validation of Web Alteration Detection using Link Change State in Web Page

Validation of Web Alteration Detection using Link Change State in Web Page Web 182-8585 1 5-1 m-shouta@uec.ac.jp,zetaka@computer.org Web Web URL Web Alexa Top 100 Web Validation of Web Alteration Detection using Link Change State in Web Page Shouta Mochizuki Tetsuji Takada The

More information

Fuzzy Partitioning with FID3.1

Fuzzy Partitioning with FID3.1 Fuzzy Partitioning with FID3.1 Cezary Z. Janikow Dept. of Mathematics and Computer Science University of Missouri St. Louis St. Louis, Missouri 63121 janikow@umsl.edu Maciej Fajfer Institute of Computing

More information

Artificial Intelligence. Programming Styles

Artificial Intelligence. Programming Styles Artificial Intelligence Intro to Machine Learning Programming Styles Standard CS: Explicitly program computer to do something Early AI: Derive a problem description (state) and use general algorithms to

More information

URL Phishing Analysis using Random Forest

URL Phishing Analysis using Random Forest International Journal of Pure and Applied Mathematics Volume 118 No. 20 2018, 4159-4163 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu URL Phishing Analysis using Random Forest S.

More information

Zozzle: Low-overhead Mostly Static JavaScript Malware Detection

Zozzle: Low-overhead Mostly Static JavaScript Malware Detection Zozzle: Low-overhead Mostly Static JavaScript Malware Detection Charles Curtsinger Benjamin Livshits and Benjamin Zorn Christian Seifert UMass at Amherst Microsoft Research Microsoft Microsoft Research

More information

Constrained Classification of Large Imbalanced Data

Constrained Classification of Large Imbalanced Data Constrained Classification of Large Imbalanced Data Martin Hlosta, R. Stríž, J. Zendulka, T. Hruška Brno University of Technology, Faculty of Information Technology Božetěchova 2, 612 66 Brno ihlosta@fit.vutbr.cz

More information

Modified Particle Swarm Optimization

Modified Particle Swarm Optimization Modified Particle Swarm Optimization Swati Agrawal 1, R.P. Shimpi 2 1 Aerospace Engineering Department, IIT Bombay, Mumbai, India, swati.agrawal@iitb.ac.in 2 Aerospace Engineering Department, IIT Bombay,

More information

A Comparative Study of Selected Classification Algorithms of Data Mining

A Comparative Study of Selected Classification Algorithms of Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.220

More information

Feature weighting using particle swarm optimization for learning vector quantization classifier

Feature weighting using particle swarm optimization for learning vector quantization classifier Journal of Physics: Conference Series PAPER OPEN ACCESS Feature weighting using particle swarm optimization for learning vector quantization classifier To cite this article: A Dongoran et al 2018 J. Phys.:

More information

Malicious Web Pages Detection Based on Abnormal Visibility Recognition

Malicious Web Pages Detection Based on Abnormal Visibility Recognition Malicious Web Pages Detection Based on Abnormal Visibility Recognition Bin Liang 1 2, Jianjun Huang 1, Fang Liu 1, Dawei Wang 1, Daxiang Dong 1, Zhaohui Liang 1 2 1. School of Information, Renmin University

More information

SIMULTANEOUS COMPUTATION OF MODEL ORDER AND PARAMETER ESTIMATION FOR ARX MODEL BASED ON MULTI- SWARM PARTICLE SWARM OPTIMIZATION

SIMULTANEOUS COMPUTATION OF MODEL ORDER AND PARAMETER ESTIMATION FOR ARX MODEL BASED ON MULTI- SWARM PARTICLE SWARM OPTIMIZATION SIMULTANEOUS COMPUTATION OF MODEL ORDER AND PARAMETER ESTIMATION FOR ARX MODEL BASED ON MULTI- SWARM PARTICLE SWARM OPTIMIZATION Kamil Zakwan Mohd Azmi, Zuwairie Ibrahim and Dwi Pebrianti Faculty of Electrical

More information

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts 2014 7th International Symposium on Telecommunications (IST'2014) BotCatch: Botnet Based on Coordinated Group Activities of Compromised Hosts Mosa Yahyazadeh and Mahdi Abadi Faculty of Electrical and Computer

More information

Improving Tree-Based Classification Rules Using a Particle Swarm Optimization

Improving Tree-Based Classification Rules Using a Particle Swarm Optimization Improving Tree-Based Classification Rules Using a Particle Swarm Optimization Chi-Hyuck Jun *, Yun-Ju Cho, and Hyeseon Lee Department of Industrial and Management Engineering Pohang University of Science

More information

Atomizer: Fast, Scalable and Lightweight Heap Analyzer for Virtual Machines in a Cloud Environment

Atomizer: Fast, Scalable and Lightweight Heap Analyzer for Virtual Machines in a Cloud Environment Atomizer: Fast, Scalable and Lightweight Heap Analyzer for Virtual Machines in a Cloud Environment Salman Javaid Aleksandar Zoranic Irfan Ahmed Golden G. Richard III University of New Orleans Greater New

More information

MIT Samberg Center Cambridge, MA, USA. May 30 th June 2 nd, by C. Rea, R.S. Granetz MIT Plasma Science and Fusion Center, Cambridge, MA, USA

MIT Samberg Center Cambridge, MA, USA. May 30 th June 2 nd, by C. Rea, R.S. Granetz MIT Plasma Science and Fusion Center, Cambridge, MA, USA Exploratory Machine Learning studies for disruption prediction on DIII-D by C. Rea, R.S. Granetz MIT Plasma Science and Fusion Center, Cambridge, MA, USA Presented at the 2 nd IAEA Technical Meeting on

More information

International Journal of Software and Web Sciences (IJSWS)

International Journal of Software and Web Sciences (IJSWS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Self-Learning Systems for Network Intrusion Detection

Self-Learning Systems for Network Intrusion Detection Self-Learning Systems for Network Intrusion Detection Konrad Rieck Computer Security Group University of Göttingen GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN About Me» Junior Professor for Computer Security» Research

More information

Fast or furious? - User analysis of SF Express Inc

Fast or furious? - User analysis of SF Express Inc CS 229 PROJECT, DEC. 2017 1 Fast or furious? - User analysis of SF Express Inc Gege Wen@gegewen, Yiyuan Zhang@yiyuan12, Kezhen Zhao@zkz I. MOTIVATION The motivation of this project is to predict the likelihood

More information

CS 229 Midterm Review

CS 229 Midterm Review CS 229 Midterm Review Course Staff Fall 2018 11/2/2018 Outline Today: SVMs Kernels Tree Ensembles EM Algorithm / Mixture Models [ Focus on building intuition, less so on solving specific problems. Ask

More information

Karami, A., Zhou, B. (2015). Online Review Spam Detection by New Linguistic Features. In iconference 2015 Proceedings.

Karami, A., Zhou, B. (2015). Online Review Spam Detection by New Linguistic Features. In iconference 2015 Proceedings. Online Review Spam Detection by New Linguistic Features Amir Karam, University of Maryland Baltimore County Bin Zhou, University of Maryland Baltimore County Karami, A., Zhou, B. (2015). Online Review

More information

Improving Results and Performance of Collaborative Filtering-based Recommender Systems using Cuckoo Optimization Algorithm

Improving Results and Performance of Collaborative Filtering-based Recommender Systems using Cuckoo Optimization Algorithm Improving Results and Performance of Collaborative Filtering-based Recommender Systems using Cuckoo Optimization Algorithm Majid Hatami Faculty of Electrical and Computer Engineering University of Tabriz,

More information

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding e Scientific World Journal, Article ID 746260, 8 pages http://dx.doi.org/10.1155/2014/746260 Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding Ming-Yi

More information

Wrapper Feature Selection using Discrete Cuckoo Optimization Algorithm Abstract S.J. Mousavirad and H. Ebrahimpour-Komleh* 1 Department of Computer and Electrical Engineering, University of Kashan, Kashan,

More information

Malicious Drive-By-Download Website Classification Using JavaScript Features. Sam Wang. B.Sc., University of Victoria, 2014

Malicious Drive-By-Download Website Classification Using JavaScript Features. Sam Wang. B.Sc., University of Victoria, 2014 Malicious Drive-By-Download Website Classification Using JavaScript Features by Sam Wang B.Sc., University of Victoria, 2014 An Industrial Project Submitted in Partial Fulfillment of the Requirements for

More information

Performance Analysis of Data Mining Classification Techniques

Performance Analysis of Data Mining Classification Techniques Performance Analysis of Data Mining Classification Techniques Tejas Mehta 1, Dr. Dhaval Kathiriya 2 Ph.D. Student, School of Computer Science, Dr. Babasaheb Ambedkar Open University, Gujarat, India 1 Principal

More information

CHAPTER 5 OPTIMAL CLUSTER-BASED RETRIEVAL

CHAPTER 5 OPTIMAL CLUSTER-BASED RETRIEVAL 85 CHAPTER 5 OPTIMAL CLUSTER-BASED RETRIEVAL 5.1 INTRODUCTION Document clustering can be applied to improve the retrieval process. Fast and high quality document clustering algorithms play an important

More information

Particle swarm optimization for mobile network design

Particle swarm optimization for mobile network design Particle swarm optimization for mobile network design Ayman A. El-Saleh 1,2a), Mahamod Ismail 1, R. Viknesh 2, C. C. Mark 2, and M. L. Chan 2 1 Department of Electrical, Electronics, and Systems Engineering,

More information

A *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-"&"3 -"(' ( +-" " " % '.+ % ' -0(+$,

A *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-&3 -(' ( +-   % '.+ % ' -0(+$, The structure is a very important aspect in neural network design, it is not only impossible to determine an optimal structure for a given problem, it is even impossible to prove that a given structure

More information

Dynamic Ensemble Construction via Heuristic Optimization

Dynamic Ensemble Construction via Heuristic Optimization Dynamic Ensemble Construction via Heuristic Optimization Şenay Yaşar Sağlam and W. Nick Street Department of Management Sciences The University of Iowa Abstract Classifier ensembles, in which multiple

More information

Fraud Detection Using Random Forest Algorithm

Fraud Detection Using Random Forest Algorithm Fraud Detection Using Random Forest Algorithm Eesha Goel Computer Science Engineering and Technology, GZSCCET, Bhatinda, India eesha1992@rediffmail.com Abhilasha Computer Science Engineering and Technology,

More information

Automatic Simplification of Obfuscated JavaScript Code: A Semantics-Based Approach

Automatic Simplification of Obfuscated JavaScript Code: A Semantics-Based Approach Automatic Simplification of Obfuscated JavaScript Code: A Semantics-Based Approach Gen Lu Saumya Debray Department of Computer Science The University of Arizona Tucson, AZ 85721, USA Email: {genlu, debray}@cs.arizona.edu

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN 1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique

More information

Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization

Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization J.Venkatesh 1, B.Chiranjeevulu 2 1 PG Student, Dept. of ECE, Viswanadha Institute of Technology And Management,

More information

Learning to Recognize Faces in Realistic Conditions

Learning to Recognize Faces in Realistic Conditions 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University

More information

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization 2017 2 nd International Electrical Engineering Conference (IEEC 2017) May. 19 th -20 th, 2017 at IEP Centre, Karachi, Pakistan Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic

More information

Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization

Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization M. Shahab Alam, M. Usman Rafique, and M. Umer Khan Abstract Motion planning is a key element of robotics since it empowers

More information

Unknown Malicious Code Detection Based on Bayesian

Unknown Malicious Code Detection Based on Bayesian Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 3836 3842 Advanced in Control Engineering and Information Science Unknown Malicious Code Detection Based on Bayesian Yingxu Lai

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of GA and PSO over Economic Load Dispatch Problem Sakshi Rajpoot sakshirajpoot1988@gmail.com Dr. Sandeep Bhongade sandeepbhongade@rediffmail.com Abstract Economic Load dispatch problem

More information

Tri-modal Human Body Segmentation

Tri-modal Human Body Segmentation Tri-modal Human Body Segmentation Master of Science Thesis Cristina Palmero Cantariño Advisor: Sergio Escalera Guerrero February 6, 2014 Outline 1 Introduction 2 Tri-modal dataset 3 Proposed baseline 4

More information

Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation

Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation Ripandeep Kaur 1, Manpreet Kaur 2 1, 2 Punjab Technical University, Chandigarh Engineering College, Landran, Punjab, India Abstract:

More information

OPTIMIZATION OF BAGGING CLASSIFIERS BASED ON SBCB ALGORITHM

OPTIMIZATION OF BAGGING CLASSIFIERS BASED ON SBCB ALGORITHM OPTIMIZATION OF BAGGING CLASSIFIERS BASED ON SBCB ALGORITHM XIAO-DONG ZENG, SAM CHAO, FAI WONG Faculty of Science and Technology, University of Macau, Macau, China E-MAIL: ma96506@umac.mo, lidiasc@umac.mo,

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Approach Using Genetic Algorithm for Intrusion Detection System

Approach Using Genetic Algorithm for Intrusion Detection System Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-

More information

White Paper. New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection

White Paper. New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection White Paper New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection The latest version of the flagship McAfee Gateway Anti-Malware technology adapts to new threats and plans for future

More information

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,

More information

A Bagging Method using Decision Trees in the Role of Base Classifiers

A Bagging Method using Decision Trees in the Role of Base Classifiers A Bagging Method using Decision Trees in the Role of Base Classifiers Kristína Machová 1, František Barčák 2, Peter Bednár 3 1 Department of Cybernetics and Artificial Intelligence, Technical University,

More information

Network Traffic Measurements and Analysis

Network Traffic Measurements and Analysis DEIB - Politecnico di Milano Fall, 2017 Sources Hastie, Tibshirani, Friedman: The Elements of Statistical Learning James, Witten, Hastie, Tibshirani: An Introduction to Statistical Learning Andrew Ng:

More information

MIT 801. Machine Learning I. [Presented by Anna Bosman] 16 February 2018

MIT 801. Machine Learning I. [Presented by Anna Bosman] 16 February 2018 MIT 801 [Presented by Anna Bosman] 16 February 2018 Machine Learning What is machine learning? Artificial Intelligence? Yes as we know it. What is intelligence? The ability to acquire and apply knowledge

More information

Facial Expression Classification with Random Filters Feature Extraction

Facial Expression Classification with Random Filters Feature Extraction Facial Expression Classification with Random Filters Feature Extraction Mengye Ren Facial Monkey mren@cs.toronto.edu Zhi Hao Luo It s Me lzh@cs.toronto.edu I. ABSTRACT In our work, we attempted to tackle

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

Applying Supervised Learning

Applying Supervised Learning Applying Supervised Learning When to Consider Supervised Learning A supervised learning algorithm takes a known set of input data (the training set) and known responses to the data (output), and trains

More information

A Modified PSO Technique for the Coordination Problem in Presence of DG

A Modified PSO Technique for the Coordination Problem in Presence of DG A Modified PSO Technique for the Coordination Problem in Presence of DG M. El-Saadawi A. Hassan M. Saeed Dept. of Electrical Engineering, Faculty of Engineering, Mansoura University, Egypt saadawi1@gmail.com-

More information

A Feature Selection Method to Handle Imbalanced Data in Text Classification

A Feature Selection Method to Handle Imbalanced Data in Text Classification A Feature Selection Method to Handle Imbalanced Data in Text Classification Fengxiang Chang 1*, Jun Guo 1, Weiran Xu 1, Kejun Yao 2 1 School of Information and Communication Engineering Beijing University

More information

Random projection for non-gaussian mixture models

Random projection for non-gaussian mixture models Random projection for non-gaussian mixture models Győző Gidófalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 92037 gyozo@cs.ucsd.edu Abstract Recently,

More information

Why Discuss JavaScript? CS312: Programming Languages. Lecture 21: JavaScript. JavaScript Target. What s a Scripting Language?

Why Discuss JavaScript? CS312: Programming Languages. Lecture 21: JavaScript. JavaScript Target. What s a Scripting Language? Why Discuss JavaScript? CS312: Programming Languages Lecture 21: JavaScript Thomas Dillig JavaScript is very widely used and growing Any AJAX application heavily relies on JavaScript JavaScript also has

More information

A New Technique to Optimize User s Browsing Session using Data Mining

A New Technique to Optimize User s Browsing Session using Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION

FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION Suranaree J. Sci. Technol. Vol. 19 No. 4; October - December 2012 259 FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION Pavee Siriruk * Received: February 28, 2013; Revised: March 12,

More information

SHILLING ATTACK DETECTION IN RECOMMENDER SYSTEMS USING CLASSIFICATION TECHNIQUES

SHILLING ATTACK DETECTION IN RECOMMENDER SYSTEMS USING CLASSIFICATION TECHNIQUES SHILLING ATTACK DETECTION IN RECOMMENDER SYSTEMS USING CLASSIFICATION TECHNIQUES Parneet Kaur Department of Computer Science & Engg. Thapar University, Patiala, Punjab, India Abstract Collaborative filtering

More information

A New Discrete Binary Particle Swarm Optimization based on Learning Automata

A New Discrete Binary Particle Swarm Optimization based on Learning Automata A New Discrete Binary Particle Swarm Optimization based on Learning Automata R. Rastegar M. R. Meybodi K. Badie Soft Computing Lab Soft Computing Lab Information Technology Computer Eng. Department Computer

More information

CS312: Programming Languages. Lecture 21: JavaScript

CS312: Programming Languages. Lecture 21: JavaScript CS312: Programming Languages Lecture 21: JavaScript Thomas Dillig Thomas Dillig, CS312: Programming Languages Lecture 21: JavaScript 1/25 Why Discuss JavaScript? JavaScript is very widely used and growing

More information

Text Classification for Spam Using Naïve Bayesian Classifier

Text Classification for  Spam Using Naïve Bayesian Classifier Text Classification for E-mail Spam Using Naïve Bayesian Classifier Priyanka Sao 1, Shilpi Chaubey 2, Sonali Katailiha 3 1,2,3 Assistant ProfessorCSE Dept, Columbia Institute of Engg&Tech, Columbia Institute

More information

Particle Swarm Optimization For N-Queens Problem

Particle Swarm Optimization For N-Queens Problem Journal of Advanced Computer Science and Technology, 1 (2) (2012) 57-63 Science Publishing Corporation www.sciencepubco.com/index.php/jacst Particle Swarm Optimization For N-Queens Problem Aftab Ahmed,

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

Particle Swarm Optimization Based Approach for Location Area Planning in Cellular Networks

Particle Swarm Optimization Based Approach for Location Area Planning in Cellular Networks International Journal of Intelligent Systems and Applications in Engineering Advanced Technology and Science ISSN:2147-67992147-6799 www.atscience.org/ijisae Original Research Paper Particle Swarm Optimization

More information

Hybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques

Hybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques Hybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques Nasser Sadati Abstract Particle Swarm Optimization (PSO) algorithms recently invented as intelligent optimizers with several highly

More information

KEYWORDS: Clustering, RFPCM Algorithm, Ranking Method, Query Redirection Method.

KEYWORDS: Clustering, RFPCM Algorithm, Ranking Method, Query Redirection Method. IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMPROVED ROUGH FUZZY POSSIBILISTIC C-MEANS (RFPCM) CLUSTERING ALGORITHM FOR MARKET DATA T.Buvana*, Dr.P.krishnakumari *Research

More information

Robustness of Selective Desensitization Perceptron Against Irrelevant and Partially Relevant Features in Pattern Classification

Robustness of Selective Desensitization Perceptron Against Irrelevant and Partially Relevant Features in Pattern Classification Robustness of Selective Desensitization Perceptron Against Irrelevant and Partially Relevant Features in Pattern Classification Tomohiro Tanno, Kazumasa Horie, Jun Izawa, and Masahiko Morita University

More information

Feature Selection Algorithm with Discretization and PSO Search Methods for Continuous Attributes

Feature Selection Algorithm with Discretization and PSO Search Methods for Continuous Attributes Feature Selection Algorithm with Discretization and PSO Search Methods for Continuous Attributes Madhu.G 1, Rajinikanth.T.V 2, Govardhan.A 3 1 Dept of Information Technology, VNRVJIET, Hyderabad-90, INDIA,

More information

Discrete Particle Swarm Optimization for Solving a Single to Multiple Destinations in Evacuation Planning

Discrete Particle Swarm Optimization for Solving a Single to Multiple Destinations in Evacuation Planning Discrete Particle Swarm Optimization for Solving a Single to Multiple Destinations in Evacuation Planning 1 MARINA YUSOFF, 2 JUNAIDAH ARIFFIN, 1 AZLINAH MOHAMED 1 Faculty of Computer and Mathematical Sciences

More information

A NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION

A NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION A NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION Manjeet Singh 1, Divesh Thareja 2 1 Department of Electrical and Electronics Engineering, Assistant Professor, HCTM Technical

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (  1 Cluster Based Speed and Effective Feature Extraction for Efficient Search Engine Manjuparkavi A 1, Arokiamuthu M 2 1 PG Scholar, Computer Science, Dr. Pauls Engineering College, Villupuram, India 2 Assistant

More information

Flow-based Anomaly Intrusion Detection System Using Neural Network

Flow-based Anomaly Intrusion Detection System Using Neural Network Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data

More information

Bagging and Boosting Algorithms for Support Vector Machine Classifiers

Bagging and Boosting Algorithms for Support Vector Machine Classifiers Bagging and Boosting Algorithms for Support Vector Machine Classifiers Noritaka SHIGEI and Hiromi MIYAJIMA Dept. of Electrical and Electronics Engineering, Kagoshima University 1-21-40, Korimoto, Kagoshima

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Business Club. Decision Trees

Business Club. Decision Trees Business Club Decision Trees Business Club Analytics Team December 2017 Index 1. Motivation- A Case Study 2. The Trees a. What is a decision tree b. Representation 3. Regression v/s Classification 4. Building

More information

Predicting Rare Failure Events using Classification Trees on Large Scale Manufacturing Data with Complex Interactions

Predicting Rare Failure Events using Classification Trees on Large Scale Manufacturing Data with Complex Interactions 2016 IEEE International Conference on Big Data (Big Data) Predicting Rare Failure Events using Classification Trees on Large Scale Manufacturing Data with Complex Interactions Jeff Hebert, Texas Instruments

More information

Allstate Insurance Claims Severity: A Machine Learning Approach

Allstate Insurance Claims Severity: A Machine Learning Approach Allstate Insurance Claims Severity: A Machine Learning Approach Rajeeva Gaur SUNet ID: rajeevag Jeff Pickelman SUNet ID: pattern Hongyi Wang SUNet ID: hongyiw I. INTRODUCTION The insurance industry has

More information