JSObfusDetector: A Binary PSO-based One-Class Classifier Ensemble to Detect Obfuscated JavaScript Code
|
|
- Charlene Cooper
- 6 years ago
- Views:
Transcription
1 2015 International Symposium on Artificial Intelligence and Signal Processing (AISP) JSObfusDetector: A Binary PSO-based One-Class Classifier Ensemble to Detect Obfuscated JavaScript Code Mehran Jodavi, Mahdi Abadi, and Elham Parhizkar Department of Electrical and Computer Engineering Tarbiat Modares University Tehran, Iran {mehran.jodavi, abadi, e.parhizkar}@modares.ac.ir Abstract JavaScript code obfuscation has become a major technique used by malware writers to evade static analysis techniques. Over the past years, a number of dynamic analysis techniques have been proposed to detect obfuscated malicious JavaScript code at runtime. However, because of their runtime overheads, these techniques are slow and thus not widely used in practice. On the other hand, since a large quantity of benign JavaScript code is obfuscated to protect intellectual property, it is not effective to use the intrinsic features of obfuscated JavaScript code for static analysis purposes. Therefore, we are forced to distinguish between obfuscated and non-obfuscated JavaScript code so that we can devise an efficient and effective analysis technique to detect malicious JavaScript code. In this paper, we address this issue by presenting JSObfusDetector, a novel oneclass classifier ensemble to detect obfuscated JavaScript code. To construct the classifier ensemble, we apply a binary particle swarm optimization (PSO) algorithm, called ParticlePruner, on an initial ensemble of one-class SVM classifiers to find a subensemble whose members are both accurate and have diversity in their outputs. We evaluate JSObfusDetector using a dataset of obfuscated and non-obfuscated JavaScript code. The experimental results show that JSObfusDetector can achieve about 97% precision, 91% recall, and 94% F-measure. Keywords obfuscated JavaScript code; static analysis; classifier ensemble; one-class classifier; ensemble pruning; particle swarm optimization I. INTRODUCTION Generally, code obfuscation is the deliberate act of transforming readable code into equivalent obfuscated code that is more difficult to understand [1]. It is commonly used by software developers to protect the intellectual property of their code or by malware writers to evade signature-based detection systems. JavaScript is a dynamic scripting language, which means that the developers can generate JavaScript code at runtime. However, the dynamic nature of JavaScript is often misused by malware writers to create malicious code. Therefore, a number of static analysis techniques [2], [3] have been proposed to detect malicious JavaScript code. While being fast and effective, these techniques have limited success when dealing with obfuscated JavaScript code. Due to this limitation, a number of dynamic analysis techniques [4], [5] have been developed to detect obfuscated malicious JavaScript code at runtime. However, because of their runtime overheads, these techniques are slow and thus not widely used in practice. On the other hand, the mere presence of obfuscated JavaScript code does not indicate the presence of any malicious content. The reason is that there is plenty of benign JavaScript code that has been intentionally obfuscated to protect intellectual property. Moreover, there are a lot of free obfuscators available that simply transform JavaScript code into equivalent obfuscated one, making the use of obfuscation in benign and malicious JavaScript code more popular as ever. According to the above discussion, if we are given a piece of non-obfuscated JavaScript code, it is reasonable that we use lightweight static techniques to analyze it. On the other hand, for obfuscated JavaScript code, it is better to use dynamic analysis techniques. As a result, we need to distinguish between obfuscated and non-obfuscated JavaScript code so that we can devise an efficient and effective analysis technique to detect malicious JavaScript code. In this paper, we address this issue by presenting JSObfusDetector, a one-class classifier ensemble to determine whether or not a piece of JavaScript code has been obfuscated for any purpose, malicious or otherwise. JSObfusDetector aims to detect obfuscated JavaScript code based on major changes in its structural and lexical aspects. JSObfusDetector consists of two main steps: training and detection. In the training step, we use a set of non-obfuscated JavaScript code blocks to construct an initial ensemble of oneclass SVM classifiers. We then prune the classifier ensemble using a novel binary particle swarm optimization (PSO) algorithm to find a near-optimal sub-ensemble. The goal is to reduce the size of the initial ensemble by selecting only a subset of the one-class SVM classifiers that are both accurate and have diversity in their outputs. In the detection step, we combine the outputs of chosen one-class SVM classifiers in the sub-ensemble using the majority voting rule to classify given JavaScript code blocks as obfuscated or non-obfuscated. Our approach is motivated by the observation that the fusion of multiple one-class classifiers can improve the classification accuracy [6]. The rest of the paper is organized as follows. In Section II, /15/$ IEEE 322
2 we describe some of the common JavaScript obfuscation techniques. In Section III, we present JSObfusDetector and experimentally evaluate it in Section IV. Finally, we discuss related work in Section V and conclude the paper in Section VI. II. BACKGROUND In this section, we first describe some of the most popular JavaScript obfuscation techniques and then give a brief overview of the binary PSO algorithm. A. JavaScript Obfuscation Techniques Obfuscation techniques are heavily used in benign and malicious JavaScript code, with the aim of making JavaScript code more difficult to understand to protect intellectual property or evade signature-based detection. In the following subsections, we briefly discuss the major obfuscation techniques being used in wild [7]. 1) Data Obfuscation. JavaScript code may be obfuscated by splitting its strings into multiple variables or substrings and concatenating them later, perhaps by using the document.write or eval functions (see Fig. 1). var mystr = "document.write('my Code')"; eval(mystr); (a) original code Fig. 1. An example of data obfuscation. var yq = "de')"; var sq = "doc"; var sm = "ument"; var kw = "('My Co"; var mystr = sq + sm + ".write" + kw + yq; eval(mystr); (b) obfuscated code 2) Encoding Obfuscation. A general technique for JavaScript obfuscation is to convert characters into their ASCII, Unicode, or hexadecimal values. Fig. 2 shows a demonstration of using Unicode values to obfuscate the string "My Code". document.write("\u004d\u0079\u0020\u0043\u006f\u0064\u0065"); Fig. 2. An example of encoding obfuscation. 3) Randomization Obfuscation. Randomization obfuscation is as simple as randomly inserting or changing some elements of code without changing the semantics at all. Variable and whitespace randomization [8] are common techniques in this category. Fig. 3 gives an example of variable randomization. function myfunc(str) { document.write(str); } var mystr = "My Code"; myfunc(mystr); (a) original code Fig. 3. An example of randomization obfuscation. function msfrt23kjgty(zs12mnjy) { document.write(zs12mnjy); } var nbuqmazsuikh = "My Code"; msfrt23kjgty(nbuqmazsuikh); (b) obfuscated code B. Binary PSO Particle swarm optimization (PSO) [9] is a population based stochastic optimization inspired by social behavior of flocks of birds when they are searching for food. In PSO, the potential solutions, known as particles, fly through the problem space exploring for better regions. Each particle in the swarm has a current position, a velocity, and a personal best position. The performance of the particle positions is measured using a predefined fitness function, which is related to the problem to be solved. Let be the position of the particle at the iteration, its personal best position at this iteration, denoted by, is updated as 1 if 1, (1) otherwise, where is the fitness function to be maximized. The best personal best position in the swarm is known as the global best position and is denoted by. Note that, throughout the paper, we use boldface to distinguish vectors from scalars. For the binary PSO [10], the elements of and can only take the values 0 and 1. The particle updates its current velocity and position using the following equation: 1, 1 0 if sig 1, 1 otherwise, where 1 and 1 are the velocity and position updated for the th dimension, 1,2,,. Also,,, and are random values in the range [0,1]. In addition, and are the acceleration constants and sig is a sigmoid function between 0 and 1. Using the sigmoid function, the velocity is interpreted as a probability to change a bit from 0 to 1 or from 1 to 0 when updating the position of particles. III. JSOBFUSDETECTOR In this section, we present JSObfusDetector, a binary PSObased one-class classifier ensemble to distinguish between obfuscated and non-obfuscated JavaScript code. JSObfusDetector is motivated by the observation that the performance of an ensemble that is composed of many base classifiers could be better than any of the base classifiers [6]. It consists of two main steps: training and detection. In the training step, we build a profile of non-obfuscated JavaScript code. To do so, we take as input a set of non-obfuscated JavaScript code blocks and extract an abstract syntax tree (AST) for each block in the set. We then traverse the ASTs to generate a set of feature vectors that are subsequently used to construct an initial ensemble of one-class SVM classifiers. Each feature vector includes values for features describing structural and lexical aspects of a JavaScript code block. We then use a binary PSO algorithm, called ParticlePruner, to find a near-optimal sub-ensemble that achieves the maximum possible fitness function. The goal is to reduce the size of by selecting only a subset of the one-class SVM classifiers that are both accurate and have diversity in their outputs. In the detection step, we extract a feature vector from each new JavaScript code block and apply it to all one-class SVM classifiers in. We then combine the outputs of these classifiers using the majority voting rule to (2) (3) 323
3 determine whether it is obfuscated or not. In the following subsections, we describe in detail what features are extracted from JavaScript code blocks and how the initial one-class classifier ensemble is pruned. A. Structural and Lexical Features As previously mentioned, the three most popular JavaScript obfuscation techniques, in order of popularity, are data, encoding, and randomization obfuscation. The obfuscation techniques can be easily applied to any JavaScript code and only change its structural and lexical aspects. Considering these changes, we present the following features to detect obfuscated JavaScript code: 1) Number of String Definitions. In order to perform data obfuscation, we can split a string into multiple substrings and concatenate them later. Most obfuscated JavaScript code makes use of data obfuscation to invisible particular strings or makes use of it along with dangerous functions like eval to generate code at runtime, resulting in an increased number of string definitions. 2) Rate of String Operations. An important side effect of data and encoding obfuscation techniques is the overuse of string operations, tending to an unusually large number of string operations compared with other operations. The reason is that these techniques widely generate code from strings at runtime by calling string functions such as fromcharcode, charat, substring, and so on. 3) Maximum Length of Strings and Ratio of Long Strings. It is common for encoding obfuscation techniques to convert characters in a string into their ASCII or Unicode values, causing the length of the string to increase. 4) Number of Dynamic Code Evaluations. Dynamic code evaluation plays an important role in data and encoding obfuscation techniques. The goal is to evaluate a string as code at runtime. JavaScript supports dynamic code evaluation using functions such as eval and settimeout. 5) Minimum and Maximum Entropy of Strings. Encoding obfuscation techniques usually transform all characters of a string in order to avoid pattern-matching detection, causing changes in the probability distribution of characters. B. ParticlePruner Given an initial ensemble of one-class SVM classifiers, we apply ParticlePruner on it to reduce its size. In this algorithm, we first initialize a swarm of particles. The position of each particle is represented by a binary vector of length :,,,, (4) where is the total number of one-class SVM classifiers in. Actually, indicates a sub-ensemble of one-class SVM classifiers in. If 1, this means that the one-class SVM classifier is part of. Otherwise, it means that is not part of the sub-ensemble: 1. (5) We then iteratively perform the following steps until some termination condition (e.g., the maximum number of fitness evaluations) is reached: during each iteration, we update the personal best position of each particle using (1). Next, we determine the global best position from the entire swarm by selecting the best personal best position. Subsequently, we update the velocity 1 and the position 1 of each particle using (2) and (3). We use two measures to evaluate the overall fitness of the particle positions, namely and. Let be a particle position. and are calculated as the true negative rate and the non-pairwise diversity of, where is the sub-ensemble indicated by. Given a validation dataset of feature vectors generated from nonobfuscated JavaScript code blocks, we calculate as 1 l, (6) where is the number of feature vectors in and l is an indicator function whose value is 1 if the subensemble correctly classifies an input feature vector belonging to and 0 otherwise: l 1 Ω 2, 0 otherwise, where is the number of one-class SVM classifiers in, and Ω is an indicator function whose value is 1 if the oneclass SVM classifier classify an input feature vector as belonging to the non-obfuscated class and 0 otherwise: Ω 1, (8) 0 otherwise. Actually, we use the majority voting rule to combine the outputs of one-class SVM classifiers in. Subsequently, we calculate as 1, (9) 1 1 where is the average true negative rate of one-class SVM classifiers in : (7) 1, (10) where is the proportion of one-class SVM classifiers in that correctly classify a feature vector : 1 Ω. (11) In fact, is a non-pairwise diversity measure based on the Kappa inter-rater agreement [11]. If there is no variation in the values of for all feature vectors, then there is more diversity among the one-class SVM classifiers in. In this case, may be seen to assume its maximum value of 1. On the other hand, if the values of is 0 or 1 for all feature vectors, then there is no diversity 324
4 among the one-class SVM classifiers in and may be seen to assume its minimum value of 0. Finally, we calculate the fitness of as the weighted average of and : 1, (12) where 0,1 is a user-defined parameter. Note that to calculate and, we only need the information of the non-obfuscated class. IV. EXPERIMENTAL EVALUATION In this section, we experimentally evaluate the performance of JSObfusDetector using a dataset of obfuscated and nonobfuscated JavaScript code blocks. A. Experimental Setup The dataset used in our experiments was consisted of 400 obfuscated and 1500 non-obfuscated JavaScript code blocks. To create the dataset, we captured the main web pages of the Alexa top 1000 websites [12] and selected the JavaScript code blocks of these web pages that were not suspected of being obfuscated. Moreover, we collected a number of benign and malicious JavaScript code blocks and obfuscated them using free online JavaScript obfuscators, such as [13], [14], [15]. In addition, we enriched the resulting dataset with some obfuscated JavaScript code blocks from [16]. To extract the AST of each block in the dataset, we used Rhino [17], which is a JavaScript engine developed in Java and managed by the Mozilla Foundation as open source software. When generating feature vectors from the obtained ASTs, we considered a string as long if its length was greater than a certain threshold which was empirically set to 500. We divided our dataset into training, validation, and testing datasets. The training and validation datasets consisted of 900 and 300 non-obfuscated JavaScript code blocks and were respectively used for constructing and pruning an initial oneclass classifier ensemble. The remaining non-obfuscated JavaScript code blocks and all obfuscated ones were used for testing purposes. For the purpose of our experiments, we constructed an initial ensemble of multiple one-class SVM classifiers using bagging [18] and the random subspace method [19]. In bagging, we randomly sampled the training dataset times with replacement, resulting in different training datasets with sizes equal to the original training dataset. In random subspace method, we independently trained one-class SVM classifiers on feature subsets of size 5, randomly selected from the training datasets produced by bagging. To implement the one-class SVM classifiers, we used the LIBSVM package [20]. We performed 5-fold cross-validation with grid search to tune the oneclass SVM parameters. We pruned the initial ensemble using ParticlePruner. It has two main control parameters: the number of particles ( ) and the maximum number of iterations ( ). For all experiments, we set to 50 and to 500. All reported results are averages of 30 runs. B. Performance Measures To evaluate the performance of JSObfusDetector, we used the standard measures of precision ( ), recall ( ), and F- measure ( ):,, (13) 2, where is the number of correctly classified obfuscated JavaScript code blocks, is the number of incorrectly classified non-obfuscated JavaScript code blocks, and is the number of incorrectly classified obfuscated JavaScript code blocks. C. Experimental Results We performed several experiments to analyze how the initial ensemble size,, affects the precision, recall, and F- measure of JSObfusDetector. By the initial ensemble size, we mean the total number of one-class SVM classifiers in the initial ensemble. Table I shows the obtained results for different values of. The average ensemble size after pruning is denoted by. Clearly, with an increase in, all the performance measures increase. However, a higher value of results in a higher value of and thus incurs more computational cost in the detection step. From the table, we can make a trade-off between the classification performance and the pruned ensemble size by setting 40. TABLE I. EFFECT OF ON THE PRECISION, RECALL, AND F-MEASURE OF JSOBFUSDETECTOR Precision Recall F-measure Next, to evaluate the impact of ParticlePruner on the performance of JSObfusDetector, we implemented another variant of it, called GenPruner. It should be mentioned that GenPruner Precision Recall F-measure ParticlePruner GenPruner Fig. 4. Comparison of ParticlePruner and GenPruner in terms of precision, recall, and F-measure. 325
5 is similar to ParticlePruner, with this difference that it uses standard genetic algorithm (SGA) to prune the initial ensemble. On the basis of the results in Fig. 4, we find that ParticlePruner outperforms GenPruner in terms of precision, recall, and F- measure. Therefore, we conclude that ParticlePruner can better explore the ensemble space and find a near-optimal subensemble. After that, we designed some experiments to evaluate the impact of various features in our feature set on the classification performance of JSObfusDetector. For this purpose, we first obtained the ranking of the features using three common feature ranking measures, namely information gain (IG), chisquare (CS), and correlation (CR). We then evaluated the classification performance of JSObfusDetector for 7 nested subsets of features. The first subset contained the top ranked feature; the second subset contained the top two ranked features, and so on. The last subset contained all features. The results in Table II show that the length-based features (maximum length of strings and ratio of long strings) are highly ranked in all three feature ranking measures. The further analysis of our dataset showed that less than 9% of explicitly defined strings in nonobfuscated JavaScript code blocks were long, while this value was more than 40% for obfuscated JavaScript code blocks. However, as shown in Table III, these two features alone are not enough for achieving a high classification performance and so we need to consider all features together to achieve good performance. Finally, we performed an experiment to compare the classification performance of JSObfusDetector with that of the best individual one-class SVM classifier. The results are shown in Fig. 5. As we expect, JSObfusDetector achieves the better precision, recall, and F-measure. Therefore, we conclude that oneclass classifier ensembles can be considered as an effective tool to detect obfuscated JavaScript code. TABLE II. RANKING OF THE FEATURES USING THREE COMMON FEATURE RANKING MEASURES Feature IG CS CR Number of String Definitions Rate of String Operations Maximum Length of Strings Ratio of Long Strings Number of Dynamic Code Evaluations Minimum Entropy of Strings Maximum Entropy of Strings TABLE III. PRECISION, RECALL, AND F-MEASURE OF JSOBFUSDETECTOR FOR DIFFERENT SUBSETS OF FEATURES Feature Subset Precision Recall F-measure , ,, ,,, ,,,, ,,,,, ,,,,,, Precision Recall F-measure JSObfusDetector Best Classifier Fig. 5. Comparison of JSObfusDetector and the best individual one-class SVM classifier in terms of precision, recall, and F-measure. V. RELATED WORK Most related work in the literature assumes that obfuscated JavaScript code is also malicious. For example, Choi et al. [22] proposed a technique to detect obfuscated strings in malicious web pages. Cova et al. [23] presented an approach for detecting malicious JavaScript code that relies on dynamic analysis and anomaly detection. They defined three features to dynamically identify the operations performed during the deobfuscation step. Canali et al. [24] introduced Prophiler, a filtering system that uses static analysis to distinguish between benign and malicious web pages. Prophiler uses some features derived from the HTML contents, associated JavaScript code, and URL of each web page to build detection models. They considered obfuscated JavaScript code within their design of features. However, their features are inadequate to effectively detect all JavaScript obfuscation techniques developed by malware writers. Curtsinger et al. [2] proposed ZOZZLE, a mostly static detector that is able to examine a web page and decide if it contains a heap spraying JavaScript malware. While their analysis is entirely static, ZOZZLE has a runtime component to address the issue of JavaScript obfuscation. In order to deal with obfuscation, ZOZZLE has integrated with the web browser s JavaScript engine to collect and process JavaScript code that is created at runtime. Xu et al. [3] presented a function invocation based analysis technique that leverages the combination of static analysis and run-time inspection to detect obfuscated malicious JavaScript code. Their underlying assumption is that obfuscated malicious JavaScript code has to be deobfuscated before fulfilling its malicious intent, and in JavaScript, the deobfuscation process has to invoke certain functions. Based on this assumption, they identify the function invocations that can be potentially involved in obfuscated malicious JavaScript code. However, dynamic characteristics of JavaScript allow developers to manipulate basic techniques of code obfuscation in infinite ways and obfuscate their JavaScript code in various forms. Some researchers have considered JavaScript code obfuscation as a self-determining problem and tried to detect any piece of obfuscated JavaScript code. Kaplan et al. [21] presented NOFUS, a tool that automatically determines whether a piece of JavaScript code has been obfuscated for any purpose, malicious or otherwise. NOFUS follows its previous work, ZOZZLE 326
6 [2], which uses Bayesian classification of hierarchical features of the JavaScript AST to identify syntax elements. It has been shown that both ZOZZLE and NOFUS cannot be considered as a comprehensive solution for the mentioned problem [1], because they consider very specific categories of obfuscated JavaScript code. Taharwa et al. [1] presented JSOD, a static analysis solution to detect obfuscated JavaScript code. Although there exists some resemblance in manner between JSOD and NOFUS, but unlike NOFUS which extracts flat features from AST, JSOD retains contextual information to handle a general form of JavaScript obfuscation techniques, known as readable obfuscation. However, it can be considered as a supervised obfuscation detector in which a Bayesian classifier is trained using context-based features that are extracted from the AST of JavaScript code. Therefore, similar to other supervised detectors, JSOD cannot handle new JavaScript obfuscation techniques. We have previously shown that by using our structural and lexical features we can devise an efficient semi-supervised JavaScript obfuscation detector that only uses non-obfuscated pieces of JavaScript code for training. Therefore, as a matter of fact, our obfuscation detector is able to handle both known and unknown JavaScript obfuscation techniques. VI. CONCLUSIONS JavaScript code is often obfuscated by software developers and malware writers to make its understanding more difficult, and thus, to conceal its purpose. In this paper, we presented JSObfusDetector, a novel approach based on the idea of ensemble learning to detect obfuscated JavaScript code. At first, JSObfusDetector constructs an initial ensemble of one-class SVM classifiers and then applies a binary PSO algorithm, called ParticlePruner, on it to find a sub-ensemble whose members are both accurate and have diversity in their outputs. The results of our experiments on a dataset of obfuscated and nonobfuscated JavaScript code demonstrate that JSObfusDetector can achieve high precision and recall. Therefore, it can be considered as an effective tool to detect obfuscated JavaScript code. While most related work focuses on detecting obfuscated malicious JavaScript code, JSObfusDetector tries to distinguish between obfuscated and non-obfuscated JavaScript code so that we can devise an efficient and effective analysis technique to detect malicious JavaScript code. REFERENCES [1] I. A. AL-Taharwa, H.-M. Lee, A. B. Jeng, K.-P. Wu, C.-S. Ho, and S.- M. Chen, JSOD: JavaScript obfuscation detector, Security and Communication Networks, [2] C. Curtsinger, B. Livshits, B. Zorn, and C. Seifert, Zozzle: Lowoverhead mostly static JavaScript malware detection, in Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, USA, [3] W. Xu, F. Zhang, and S. Zhu, JStill: Mostly static detection of obfuscated malicious JavaScript code, in Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, [4] G. K. Jayasinghe, J. Shane Culpepper, and P. Bertok, Efficient and effective realtime prediction of drive-by download attacks, Journal of Network and Computer Applications, vol. 30, pp , [5] I. Corona, D. Maiorca, D. Ariu, and G. Giacinto, Lux0R: Detection of malicious PDF-embedded JavaScript code through discriminant analysis of API references, in Proceedings of the 7th ACM Workshop on Artificial Intelligence and Security, Scottsdale, AZ, USA, [6] G. Giacinto, R. Perdisci, M. Del Rio, and F. Roli, Intrusion detection in computer networks by a modular ensemble of one-class classifiers, Information Fusion, vol. 9, no. 1, pp , [7] G. Lu and S. Debray, Automatic simplification of obfuscated JavaScript code: A semantics-based approach, in Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, Gaithersburg, MD, USA, [8] W. Xu, F. Zhang, and S. Zhu, The power of obfuscation techniques in malicious JavaScript code: A measurement study, in Proceedings of the th International Conference on Malicious and Unwanted Software, Fajardo, PR, USA, [9] R. Poli, J. Kennedy, and T. Blackwell, Particle swarm optimization, Swarm Intelligence, vol. 1, no. 1, pp , [10] J. Kennedy, and R. C. Eberhart, A discrete binary version of the particle swarm algorithm, in Proceedings of the 1997 IEEE International Conference on Systems, Man, and Cybernetics, Orlando, FL, USA, [11] L. I. Kuncheva and C. J. Whitaker, Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy, Machine Learning, vol. 51, no. 2, pp , [12] Alexa Top Global Sites. Available from: [Accessed December 2014]. [13] Free Online JavaScript and HTML Obfuscator. Available from: [Accessed December 2014]. [14] Free JavaScript Obfuscator. Available from: obfuscator.com [Accessed December 2014]. [15] JavaScript Obfuscator/Encoder. Available from: jsobfuscate.com [Accessed December 2014]. [16] M. Mansoori, I. Welch, and Q. Fu, YALIH, yet another low interaction honeyclient, in Proceedings of the 12th Australasian Information Security Conference, Auckland, New Zealand, [17] Rhino - JavaScript Engine, Mozilla Developer Network. Available from: [Accessed December 2014]. [18] J. Quinlan, Bagging, boosting, and C4.5, in Proceedings of the 13th National Conference on Artificial Intelligence, Portland, OR, USA, [19] H. Tin Kam, The random subspace method for constructing decision forests, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp , [20] C.-C. Chang and C.-J. Lin, LIBSVM: A library for support vector machines, ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, [21] S. Kaplan, B. Livshits, B. Zorn, C. Seifert, and C. Curtsinger, "NOFUS: Automatically Detecting" + string.fromcharcode(32) + "ObFuSCateD".tolowercase() + "javascript code", Technical Report, Microsoft Research, [22] Y.-H. Choi, T.-G. Kim, and S.-J. Choi. Automatic detection for JavaScript obfuscation attacks in web pages through string pattern analysis, International Journal of Security and Its Applications, vol. 4, no. 2, pp , [23] M. Cova, C. Kruegel, and G. Vigna, Detection and analysis of driveby-download attacks and malicious JavaScript code, in Proceedings of the 19th International Conference on World Wide Web, Raleigh, NC, USA, [24] D. Canali, M. Cova, G. Vigna, and C. Kruegel, Prophiler: A fast filter for the large-scale detection of malicious web pages, in Proceedings of the 20th International Conference on World Wide Web, Hyderabad, India,
Detection of Cross Site Scripting Attack and Malicious Obfuscated Javascript Code
International Journal of Engineering Research in Computer Science and Engineering Detection of Cross Site Scripting Attack and Malicious Obfuscated Javascript Code [1] Vrushali S. Bari [2] Prof. Nitin
More informationDetecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls
Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls Alireza Gorji Tarbiat Modares University Tehran, Iran alireza.gorji@modares.ac.ir Mahdi Abadi Tarbiat Modares University
More informationHybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites
Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites R. Krishnaveni, C. Chellappan, and R. Dhanalakshmi Department of Computer Science & Engineering, Anna University,
More informationJSOD: JavaScript obfuscation detector
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2015; 8:1092 1107 Published online 1 July 2014 in Wiley Online Library (wileyonlinelibrary.com)..1064 RESEARCH ARTICLE JSOD: JavaScript obfuscation
More informationMcPAD and HMM-Web: two different approaches for the detection of attacks against Web applications
McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications Davide Ariu, Igino Corona, Giorgio Giacinto, Fabio Roli University of Cagliari, Dept. of Electrical and
More informationImproving the Random Forest Algorithm by Randomly Varying the Size of the Bootstrap Samples for Low Dimensional Data Sets
Improving the Random Forest Algorithm by Randomly Varying the Size of the Bootstrap Samples for Low Dimensional Data Sets Md Nasim Adnan and Md Zahidul Islam Centre for Research in Complex Systems (CRiCS)
More informationArgha Roy* Dept. of CSE Netaji Subhash Engg. College West Bengal, India.
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Training Artificial
More informationAn improved PID neural network controller for long time delay systems using particle swarm optimization algorithm
An improved PID neural network controller for long time delay systems using particle swarm optimization algorithm A. Lari, A. Khosravi and A. Alfi Faculty of Electrical and Computer Engineering, Noushirvani
More informationInertia Weight. v i = ωv i +φ 1 R(0,1)(p i x i )+φ 2 R(0,1)(p g x i ) The new velocity update equation:
Convergence of PSO The velocity update equation: v i = v i +φ 1 R(0,1)(p i x i )+φ 2 R(0,1)(p g x i ) for some values of φ 1 and φ 2 the velocity grows without bound can bound velocity to range [ V max,v
More informationGENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM
Journal of Al-Nahrain University Vol.10(2), December, 2007, pp.172-177 Science GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM * Azhar W. Hammad, ** Dr. Ban N. Thannoon Al-Nahrain
More informationSNS College of Technology, Coimbatore, India
Support Vector Machine: An efficient classifier for Method Level Bug Prediction using Information Gain 1 M.Vaijayanthi and 2 M. Nithya, 1,2 Assistant Professor, Department of Computer Science and Engineering,
More information[Rajebhosale*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A FILTER FOR ANALYSIS AND DETECTION OF MALICIOUS WEB PAGES Prof. SagarRajebhosale*, Mr.Abhimanyu Bhor, Ms.Tejashree Desai, Ms.
More informationMalicious JavaScript Detection using Statistical Language Model
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 5-25-2016 Malicious JavaScript Detection using Statistical Language Model Anumeha Shah San Jose
More informationDetecting Malicious Web Links and Identifying Their Attack Types
Detecting Malicious Web Links and Identifying Their Attack Types Anti-Spam Team Cellopoint July 3, 2013 Introduction References A great effort has been directed towards detection of malicious URLs Blacklisting
More informationParticle Swarm Optimization applied to Pattern Recognition
Particle Swarm Optimization applied to Pattern Recognition by Abel Mengistu Advisor: Dr. Raheel Ahmad CS Senior Research 2011 Manchester College May, 2011-1 - Table of Contents Introduction... - 3 - Objectives...
More informationParticle Swarm Optimization
Particle Swarm Optimization Gonçalo Pereira INESC-ID and Instituto Superior Técnico Porto Salvo, Portugal gpereira@gaips.inesc-id.pt April 15, 2011 1 What is it? Particle Swarm Optimization is an algorithm
More informationDetection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis
Detection of Malicious Scripting Code through Discriminant and Adversary-Aware API Analysis Davide Maiorca 1, Paolo Russu 1, Igino Corona 1, Battista Biggio 1, and Giorgio Giacinto 1 Department of Electrical
More informationA Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da
More informationCell-to-switch assignment in. cellular networks. barebones particle swarm optimization
Cell-to-switch assignment in cellular networks using barebones particle swarm optimization Sotirios K. Goudos a), Konstantinos B. Baltzis, Christos Bachtsevanidis, and John N. Sahalos RadioCommunications
More informationImage Compression: An Artificial Neural Network Approach
Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and
More informationCSI5387: Data Mining Project
CSI5387: Data Mining Project Terri Oda April 14, 2008 1 Introduction Web pages have become more like applications that documents. Not only do they provide dynamic content, they also allow users to play
More informationValidation of Web Alteration Detection using Link Change State in Web Page
Web 182-8585 1 5-1 m-shouta@uec.ac.jp,zetaka@computer.org Web Web URL Web Alexa Top 100 Web Validation of Web Alteration Detection using Link Change State in Web Page Shouta Mochizuki Tetsuji Takada The
More informationFuzzy Partitioning with FID3.1
Fuzzy Partitioning with FID3.1 Cezary Z. Janikow Dept. of Mathematics and Computer Science University of Missouri St. Louis St. Louis, Missouri 63121 janikow@umsl.edu Maciej Fajfer Institute of Computing
More informationArtificial Intelligence. Programming Styles
Artificial Intelligence Intro to Machine Learning Programming Styles Standard CS: Explicitly program computer to do something Early AI: Derive a problem description (state) and use general algorithms to
More informationURL Phishing Analysis using Random Forest
International Journal of Pure and Applied Mathematics Volume 118 No. 20 2018, 4159-4163 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu URL Phishing Analysis using Random Forest S.
More informationZozzle: Low-overhead Mostly Static JavaScript Malware Detection
Zozzle: Low-overhead Mostly Static JavaScript Malware Detection Charles Curtsinger Benjamin Livshits and Benjamin Zorn Christian Seifert UMass at Amherst Microsoft Research Microsoft Microsoft Research
More informationConstrained Classification of Large Imbalanced Data
Constrained Classification of Large Imbalanced Data Martin Hlosta, R. Stríž, J. Zendulka, T. Hruška Brno University of Technology, Faculty of Information Technology Božetěchova 2, 612 66 Brno ihlosta@fit.vutbr.cz
More informationModified Particle Swarm Optimization
Modified Particle Swarm Optimization Swati Agrawal 1, R.P. Shimpi 2 1 Aerospace Engineering Department, IIT Bombay, Mumbai, India, swati.agrawal@iitb.ac.in 2 Aerospace Engineering Department, IIT Bombay,
More informationA Comparative Study of Selected Classification Algorithms of Data Mining
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.220
More informationFeature weighting using particle swarm optimization for learning vector quantization classifier
Journal of Physics: Conference Series PAPER OPEN ACCESS Feature weighting using particle swarm optimization for learning vector quantization classifier To cite this article: A Dongoran et al 2018 J. Phys.:
More informationMalicious Web Pages Detection Based on Abnormal Visibility Recognition
Malicious Web Pages Detection Based on Abnormal Visibility Recognition Bin Liang 1 2, Jianjun Huang 1, Fang Liu 1, Dawei Wang 1, Daxiang Dong 1, Zhaohui Liang 1 2 1. School of Information, Renmin University
More informationSIMULTANEOUS COMPUTATION OF MODEL ORDER AND PARAMETER ESTIMATION FOR ARX MODEL BASED ON MULTI- SWARM PARTICLE SWARM OPTIMIZATION
SIMULTANEOUS COMPUTATION OF MODEL ORDER AND PARAMETER ESTIMATION FOR ARX MODEL BASED ON MULTI- SWARM PARTICLE SWARM OPTIMIZATION Kamil Zakwan Mohd Azmi, Zuwairie Ibrahim and Dwi Pebrianti Faculty of Electrical
More informationBotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts
2014 7th International Symposium on Telecommunications (IST'2014) BotCatch: Botnet Based on Coordinated Group Activities of Compromised Hosts Mosa Yahyazadeh and Mahdi Abadi Faculty of Electrical and Computer
More informationImproving Tree-Based Classification Rules Using a Particle Swarm Optimization
Improving Tree-Based Classification Rules Using a Particle Swarm Optimization Chi-Hyuck Jun *, Yun-Ju Cho, and Hyeseon Lee Department of Industrial and Management Engineering Pohang University of Science
More informationAtomizer: Fast, Scalable and Lightweight Heap Analyzer for Virtual Machines in a Cloud Environment
Atomizer: Fast, Scalable and Lightweight Heap Analyzer for Virtual Machines in a Cloud Environment Salman Javaid Aleksandar Zoranic Irfan Ahmed Golden G. Richard III University of New Orleans Greater New
More informationMIT Samberg Center Cambridge, MA, USA. May 30 th June 2 nd, by C. Rea, R.S. Granetz MIT Plasma Science and Fusion Center, Cambridge, MA, USA
Exploratory Machine Learning studies for disruption prediction on DIII-D by C. Rea, R.S. Granetz MIT Plasma Science and Fusion Center, Cambridge, MA, USA Presented at the 2 nd IAEA Technical Meeting on
More informationInternational Journal of Software and Web Sciences (IJSWS)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
More informationSelf-Learning Systems for Network Intrusion Detection
Self-Learning Systems for Network Intrusion Detection Konrad Rieck Computer Security Group University of Göttingen GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN About Me» Junior Professor for Computer Security» Research
More informationFast or furious? - User analysis of SF Express Inc
CS 229 PROJECT, DEC. 2017 1 Fast or furious? - User analysis of SF Express Inc Gege Wen@gegewen, Yiyuan Zhang@yiyuan12, Kezhen Zhao@zkz I. MOTIVATION The motivation of this project is to predict the likelihood
More informationCS 229 Midterm Review
CS 229 Midterm Review Course Staff Fall 2018 11/2/2018 Outline Today: SVMs Kernels Tree Ensembles EM Algorithm / Mixture Models [ Focus on building intuition, less so on solving specific problems. Ask
More informationKarami, A., Zhou, B. (2015). Online Review Spam Detection by New Linguistic Features. In iconference 2015 Proceedings.
Online Review Spam Detection by New Linguistic Features Amir Karam, University of Maryland Baltimore County Bin Zhou, University of Maryland Baltimore County Karami, A., Zhou, B. (2015). Online Review
More informationImproving Results and Performance of Collaborative Filtering-based Recommender Systems using Cuckoo Optimization Algorithm
Improving Results and Performance of Collaborative Filtering-based Recommender Systems using Cuckoo Optimization Algorithm Majid Hatami Faculty of Electrical and Computer Engineering University of Tabriz,
More informationResearch Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding
e Scientific World Journal, Article ID 746260, 8 pages http://dx.doi.org/10.1155/2014/746260 Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding Ming-Yi
More informationWrapper Feature Selection using Discrete Cuckoo Optimization Algorithm Abstract S.J. Mousavirad and H. Ebrahimpour-Komleh* 1 Department of Computer and Electrical Engineering, University of Kashan, Kashan,
More informationMalicious Drive-By-Download Website Classification Using JavaScript Features. Sam Wang. B.Sc., University of Victoria, 2014
Malicious Drive-By-Download Website Classification Using JavaScript Features by Sam Wang B.Sc., University of Victoria, 2014 An Industrial Project Submitted in Partial Fulfillment of the Requirements for
More informationPerformance Analysis of Data Mining Classification Techniques
Performance Analysis of Data Mining Classification Techniques Tejas Mehta 1, Dr. Dhaval Kathiriya 2 Ph.D. Student, School of Computer Science, Dr. Babasaheb Ambedkar Open University, Gujarat, India 1 Principal
More informationCHAPTER 5 OPTIMAL CLUSTER-BASED RETRIEVAL
85 CHAPTER 5 OPTIMAL CLUSTER-BASED RETRIEVAL 5.1 INTRODUCTION Document clustering can be applied to improve the retrieval process. Fast and high quality document clustering algorithms play an important
More informationParticle swarm optimization for mobile network design
Particle swarm optimization for mobile network design Ayman A. El-Saleh 1,2a), Mahamod Ismail 1, R. Viknesh 2, C. C. Mark 2, and M. L. Chan 2 1 Department of Electrical, Electronics, and Systems Engineering,
More informationA *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-"&"3 -"(' ( +-" " " % '.+ % ' -0(+$,
The structure is a very important aspect in neural network design, it is not only impossible to determine an optimal structure for a given problem, it is even impossible to prove that a given structure
More informationDynamic Ensemble Construction via Heuristic Optimization
Dynamic Ensemble Construction via Heuristic Optimization Şenay Yaşar Sağlam and W. Nick Street Department of Management Sciences The University of Iowa Abstract Classifier ensembles, in which multiple
More informationFraud Detection Using Random Forest Algorithm
Fraud Detection Using Random Forest Algorithm Eesha Goel Computer Science Engineering and Technology, GZSCCET, Bhatinda, India eesha1992@rediffmail.com Abhilasha Computer Science Engineering and Technology,
More informationAutomatic Simplification of Obfuscated JavaScript Code: A Semantics-Based Approach
Automatic Simplification of Obfuscated JavaScript Code: A Semantics-Based Approach Gen Lu Saumya Debray Department of Computer Science The University of Arizona Tucson, AZ 85721, USA Email: {genlu, debray}@cs.arizona.edu
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN
1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique
More informationTraffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization
Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization J.Venkatesh 1, B.Chiranjeevulu 2 1 PG Student, Dept. of ECE, Viswanadha Institute of Technology And Management,
More informationLearning to Recognize Faces in Realistic Conditions
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationReview on Data Mining Techniques for Intrusion Detection System
Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,
More informationOutlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data
Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University
More informationMeta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization
2017 2 nd International Electrical Engineering Conference (IEEC 2017) May. 19 th -20 th, 2017 at IEP Centre, Karachi, Pakistan Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic
More informationMobile Robot Path Planning in Static Environments using Particle Swarm Optimization
Mobile Robot Path Planning in Static Environments using Particle Swarm Optimization M. Shahab Alam, M. Usman Rafique, and M. Umer Khan Abstract Motion planning is a key element of robotics since it empowers
More informationUnknown Malicious Code Detection Based on Bayesian
Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 3836 3842 Advanced in Control Engineering and Information Science Unknown Malicious Code Detection Based on Bayesian Yingxu Lai
More informationInternational Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)
Performance Analysis of GA and PSO over Economic Load Dispatch Problem Sakshi Rajpoot sakshirajpoot1988@gmail.com Dr. Sandeep Bhongade sandeepbhongade@rediffmail.com Abstract Economic Load dispatch problem
More informationTri-modal Human Body Segmentation
Tri-modal Human Body Segmentation Master of Science Thesis Cristina Palmero Cantariño Advisor: Sergio Escalera Guerrero February 6, 2014 Outline 1 Introduction 2 Tri-modal dataset 3 Proposed baseline 4
More informationRobust Descriptive Statistics Based PSO Algorithm for Image Segmentation
Robust Descriptive Statistics Based PSO Algorithm for Image Segmentation Ripandeep Kaur 1, Manpreet Kaur 2 1, 2 Punjab Technical University, Chandigarh Engineering College, Landran, Punjab, India Abstract:
More informationOPTIMIZATION OF BAGGING CLASSIFIERS BASED ON SBCB ALGORITHM
OPTIMIZATION OF BAGGING CLASSIFIERS BASED ON SBCB ALGORITHM XIAO-DONG ZENG, SAM CHAO, FAI WONG Faculty of Science and Technology, University of Macau, Macau, China E-MAIL: ma96506@umac.mo, lidiasc@umac.mo,
More informationThe Comparative Study of Machine Learning Algorithms in Text Data Classification*
The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification
More informationApproach Using Genetic Algorithm for Intrusion Detection System
Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-
More informationWhite Paper. New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection
White Paper New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection The latest version of the flagship McAfee Gateway Anti-Malware technology adapts to new threats and plans for future
More informationHandling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization
Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,
More informationA Bagging Method using Decision Trees in the Role of Base Classifiers
A Bagging Method using Decision Trees in the Role of Base Classifiers Kristína Machová 1, František Barčák 2, Peter Bednár 3 1 Department of Cybernetics and Artificial Intelligence, Technical University,
More informationNetwork Traffic Measurements and Analysis
DEIB - Politecnico di Milano Fall, 2017 Sources Hastie, Tibshirani, Friedman: The Elements of Statistical Learning James, Witten, Hastie, Tibshirani: An Introduction to Statistical Learning Andrew Ng:
More informationMIT 801. Machine Learning I. [Presented by Anna Bosman] 16 February 2018
MIT 801 [Presented by Anna Bosman] 16 February 2018 Machine Learning What is machine learning? Artificial Intelligence? Yes as we know it. What is intelligence? The ability to acquire and apply knowledge
More informationFacial Expression Classification with Random Filters Feature Extraction
Facial Expression Classification with Random Filters Feature Extraction Mengye Ren Facial Monkey mren@cs.toronto.edu Zhi Hao Luo It s Me lzh@cs.toronto.edu I. ABSTRACT In our work, we attempted to tackle
More informationImproved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning
Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,
More informationApplying Supervised Learning
Applying Supervised Learning When to Consider Supervised Learning A supervised learning algorithm takes a known set of input data (the training set) and known responses to the data (output), and trains
More informationA Modified PSO Technique for the Coordination Problem in Presence of DG
A Modified PSO Technique for the Coordination Problem in Presence of DG M. El-Saadawi A. Hassan M. Saeed Dept. of Electrical Engineering, Faculty of Engineering, Mansoura University, Egypt saadawi1@gmail.com-
More informationA Feature Selection Method to Handle Imbalanced Data in Text Classification
A Feature Selection Method to Handle Imbalanced Data in Text Classification Fengxiang Chang 1*, Jun Guo 1, Weiran Xu 1, Kejun Yao 2 1 School of Information and Communication Engineering Beijing University
More informationRandom projection for non-gaussian mixture models
Random projection for non-gaussian mixture models Győző Gidófalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 92037 gyozo@cs.ucsd.edu Abstract Recently,
More informationWhy Discuss JavaScript? CS312: Programming Languages. Lecture 21: JavaScript. JavaScript Target. What s a Scripting Language?
Why Discuss JavaScript? CS312: Programming Languages Lecture 21: JavaScript Thomas Dillig JavaScript is very widely used and growing Any AJAX application heavily relies on JavaScript JavaScript also has
More informationA New Technique to Optimize User s Browsing Session using Data Mining
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationFITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION
Suranaree J. Sci. Technol. Vol. 19 No. 4; October - December 2012 259 FITTING PIECEWISE LINEAR FUNCTIONS USING PARTICLE SWARM OPTIMIZATION Pavee Siriruk * Received: February 28, 2013; Revised: March 12,
More informationSHILLING ATTACK DETECTION IN RECOMMENDER SYSTEMS USING CLASSIFICATION TECHNIQUES
SHILLING ATTACK DETECTION IN RECOMMENDER SYSTEMS USING CLASSIFICATION TECHNIQUES Parneet Kaur Department of Computer Science & Engg. Thapar University, Patiala, Punjab, India Abstract Collaborative filtering
More informationA New Discrete Binary Particle Swarm Optimization based on Learning Automata
A New Discrete Binary Particle Swarm Optimization based on Learning Automata R. Rastegar M. R. Meybodi K. Badie Soft Computing Lab Soft Computing Lab Information Technology Computer Eng. Department Computer
More informationCS312: Programming Languages. Lecture 21: JavaScript
CS312: Programming Languages Lecture 21: JavaScript Thomas Dillig Thomas Dillig, CS312: Programming Languages Lecture 21: JavaScript 1/25 Why Discuss JavaScript? JavaScript is very widely used and growing
More informationText Classification for Spam Using Naïve Bayesian Classifier
Text Classification for E-mail Spam Using Naïve Bayesian Classifier Priyanka Sao 1, Shilpi Chaubey 2, Sonali Katailiha 3 1,2,3 Assistant ProfessorCSE Dept, Columbia Institute of Engg&Tech, Columbia Institute
More informationParticle Swarm Optimization For N-Queens Problem
Journal of Advanced Computer Science and Technology, 1 (2) (2012) 57-63 Science Publishing Corporation www.sciencepubco.com/index.php/jacst Particle Swarm Optimization For N-Queens Problem Aftab Ahmed,
More informationHybrid Feature Selection for Modeling Intrusion Detection Systems
Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,
More informationParticle Swarm Optimization Based Approach for Location Area Planning in Cellular Networks
International Journal of Intelligent Systems and Applications in Engineering Advanced Technology and Science ISSN:2147-67992147-6799 www.atscience.org/ijisae Original Research Paper Particle Swarm Optimization
More informationHybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques
Hybrid Particle Swarm-Based-Simulated Annealing Optimization Techniques Nasser Sadati Abstract Particle Swarm Optimization (PSO) algorithms recently invented as intelligent optimizers with several highly
More informationKEYWORDS: Clustering, RFPCM Algorithm, Ranking Method, Query Redirection Method.
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMPROVED ROUGH FUZZY POSSIBILISTIC C-MEANS (RFPCM) CLUSTERING ALGORITHM FOR MARKET DATA T.Buvana*, Dr.P.krishnakumari *Research
More informationRobustness of Selective Desensitization Perceptron Against Irrelevant and Partially Relevant Features in Pattern Classification
Robustness of Selective Desensitization Perceptron Against Irrelevant and Partially Relevant Features in Pattern Classification Tomohiro Tanno, Kazumasa Horie, Jun Izawa, and Masahiko Morita University
More informationFeature Selection Algorithm with Discretization and PSO Search Methods for Continuous Attributes
Feature Selection Algorithm with Discretization and PSO Search Methods for Continuous Attributes Madhu.G 1, Rajinikanth.T.V 2, Govardhan.A 3 1 Dept of Information Technology, VNRVJIET, Hyderabad-90, INDIA,
More informationDiscrete Particle Swarm Optimization for Solving a Single to Multiple Destinations in Evacuation Planning
Discrete Particle Swarm Optimization for Solving a Single to Multiple Destinations in Evacuation Planning 1 MARINA YUSOFF, 2 JUNAIDAH ARIFFIN, 1 AZLINAH MOHAMED 1 Faculty of Computer and Mathematical Sciences
More informationA NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION
A NEW APPROACH TO SOLVE ECONOMIC LOAD DISPATCH USING PARTICLE SWARM OPTIMIZATION Manjeet Singh 1, Divesh Thareja 2 1 Department of Electrical and Electronics Engineering, Assistant Professor, HCTM Technical
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1
Cluster Based Speed and Effective Feature Extraction for Efficient Search Engine Manjuparkavi A 1, Arokiamuthu M 2 1 PG Scholar, Computer Science, Dr. Pauls Engineering College, Villupuram, India 2 Assistant
More informationFlow-based Anomaly Intrusion Detection System Using Neural Network
Flow-based Anomaly Intrusion Detection System Using Neural Network tational power to analyze only the basic characteristics of network flow, so as to Intrusion Detection systems (KBIDES) classify the data
More informationBagging and Boosting Algorithms for Support Vector Machine Classifiers
Bagging and Boosting Algorithms for Support Vector Machine Classifiers Noritaka SHIGEI and Hiromi MIYAJIMA Dept. of Electrical and Electronics Engineering, Kagoshima University 1-21-40, Korimoto, Kagoshima
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationBusiness Club. Decision Trees
Business Club Decision Trees Business Club Analytics Team December 2017 Index 1. Motivation- A Case Study 2. The Trees a. What is a decision tree b. Representation 3. Regression v/s Classification 4. Building
More informationPredicting Rare Failure Events using Classification Trees on Large Scale Manufacturing Data with Complex Interactions
2016 IEEE International Conference on Big Data (Big Data) Predicting Rare Failure Events using Classification Trees on Large Scale Manufacturing Data with Complex Interactions Jeff Hebert, Texas Instruments
More informationAllstate Insurance Claims Severity: A Machine Learning Approach
Allstate Insurance Claims Severity: A Machine Learning Approach Rajeeva Gaur SUNet ID: rajeevag Jeff Pickelman SUNet ID: pattern Hongyi Wang SUNet ID: hongyiw I. INTRODUCTION The insurance industry has
More information