Abstract
Machine learning is widely used in security research to classify malicious activity, ranging from malware to malicious URLs and network traffic. However, published performance numbers often seem to leave little room for improvement and, due to a wide range of datasets and configurations, cannot be used to directly compare alternative approaches; moreover, most evaluations have been found to suffer from experimental bias which positively inflates results. In this manuscript we discuss the implementation of Tesseract, an open-source tool to evaluate the performance of machine learning classifiers in a security setting mimicking a deployment with typical data feeds over an extended period of time. In particular, Tesseract allows for a fair comparison of different classifiers in a realistic scenario, without disadvantaging any given classifier. Tesseract is available as open-source to provide the academic community with a way to report sound and comparable performance results, but also to help practitioners decide which system to deploy under specific budget constraints.
Original language | English |
---|---|
Pages | 2264-2266 |
Number of pages | 3 |
DOIs | |
Publication status | Published - 8 Oct 2018 |
Event | ACM Conference on Computer and Communications Security - Beanfield Centre, Toronto, Canada Duration: 15 Oct 2018 → 19 Oct 2018 https://www.sigsac.org/ccs/CCS2018/ |
Conference
Conference | ACM Conference on Computer and Communications Security |
---|---|
Abbreviated title | CCS '18 |
Country/Territory | Canada |
City | Toronto |
Period | 15/10/18 → 19/10/18 |
Internet address |
Keywords
- Malware
- Machine Learning
- Experimental Bias