eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys

AI-generated keywords: eXpose Neural Network

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Existing security machine learning systems have limitations in detecting indicators of attack
  • Current systems require significant engineering resources for development and maintenance
  • The eXpose neural network proposes a deep learning approach to overcome these challenges
  • eXpose operates on raw input signals such as malicious URLs, file paths, registry keys, etc.
  • It automates feature design and extraction using character-level embeddings and convolutional neural networks
  • In experiments, eXpose outperforms manual feature extraction baselines on intrusion detection problems
  • It achieves a 5%-10% gain in detection rate at a 0.1% false positive rate compared to baselines
  • eXpose completely automates the feature design and extraction process
  • The paper presents a promising solution to enhance security machine learning systems using deep learning techniques
  • eXpose demonstrates superior performance in detecting indicators of attack while eliminating the need for manual feature extraction and continuous tuning
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Joshua Saxe, Konstantin Berlin

Abstract: For years security machine learning research has promised to obviate the need for signature based detection by automatically learning to detect indicators of attack. Unfortunately, this vision hasn't come to fruition: in fact, developing and maintaining today's security machine learning systems can require engineering resources that are comparable to that of signature-based detection systems, due in part to the need to develop and continuously tune the "features" these machine learning systems look at as attacks evolve. Deep learning, a subfield of machine learning, promises to change this by operating on raw input signals and automating the process of feature design and extraction. In this paper we propose the eXpose neural network, which uses a deep learning approach we have developed to take generic, raw short character strings as input (a common case for security inputs, which include artifacts like potentially malicious URLs, file paths, named pipes, named mutexes, and registry keys), and learns to simultaneously extract features and classify using character-level embeddings and convolutional neural network. In addition to completely automating the feature design and extraction process, eXpose outperforms manual feature extraction based baselines on all of the intrusion detection problems we tested it on, yielding a 5%-10% detection rate gain at 0.1% false positive rate compared to these baselines.

Submitted to arXiv on 27 Feb. 2017

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1702.08568v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

The paper titled "eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys" by Joshua Saxe and Konstantin Berlin addresses the limitations of existing security machine learning systems in detecting indicators of attack. While these systems were expected to eliminate the need for signature-based detection, they have not been able to fulfill this promise. The development and maintenance of current security machine learning systems require significant engineering resources, comparable to those needed for signature-based detection systems. To overcome these challenges, the authors propose a deep learning approach called eXpose neural network. This network operates on raw input signals, such as potentially malicious URLs, file paths, named pipes, named mutexes, and registry keys. It automates the process of feature design and extraction by using character-level embeddings and convolutional neural networks. In their experiments, the authors found that eXpose outperforms manual feature extraction based baselines on all tested intrusion detection problems. It achieves a 5%-10% gain in detection rate at a 0.1% false positive rate compared to these baselines. Additionally, eXpose completely automates the feature design and extraction process. Overall, this paper presents a promising solution to enhance security machine learning systems by leveraging deep learning techniques which eliminates the need for manual feature extraction and continuous tuning as attacks evolve. The eXpose neural network demonstrates superior performance in detecting indicators of attack while eliminating the need for manual feature extraction and continuous tuning as attacks evolve.
Created on 25 Dec. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.