Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dima Stopel is active.

Publication


Featured researches published by Dima Stopel.


intelligence and security informatics | 2008

Unknown malcode detection via text categorization and the imbalance problem

Robert Moskovitch; Dima Stopel; Clint Feher; Nir Nissim; Yuval Elovici

Todaypsilas signature-based anti-viruses are very accurate, but are limited in detecting new malicious code. Currently, dozens of new malicious codes are created every day, and this number is expected to increase in the coming years. Recently, classification algorithms were used successfully for the detection of unknown malicious code. These studies used a test collection with a limited size where the same malicious-benign-file ratio in both the training and test sets, which does not reflect real-life conditions. In this paper we present a methodology for the detection of unknown malicious code, based on text categorization concepts. We performed an extensive evaluation using a test collection that contains more than 30,000 malicious and benign files, in which we investigated the imbalance problem. In real-life scenarios, the malicious file content is expected to be low, about 10% of the total files. For practical purposes, it is unclear as to what the corresponding percentage in the training set should be. Our results indicate that greater than 95% accuracy can be achieved through the use of a training set that contains below 20% malicious file content.


Journal in Computer Virology | 2009

Unknown malcode detection and the imbalance problem

Robert Moskovitch; Dima Stopel; Clint Feher; Nir Nissim; Nathalie Japkowicz; Yuval Elovici

The recent growth in network usage has motivated the creation of new malicious code for various purposes. Today’s signature-based antiviruses are very accurate for known malicious code, but can not detect new malicious code. Recently, classification algorithms were used successfully for the detection of unknown malicious code. But, these studies involved a test collection with a limited size and the same malicious: benign file ratio in both the training and test sets, a situation which does not reflect real-life conditions. We present a methodology for the detection of unknown malicious code, which examines concepts from text categorization, based on n-grams extraction from the binary code and feature selection. We performed an extensive evaluation, consisting of a test collection of more than 30,000 files, in which we investigated the class imbalance problem. In real-life scenarios, the malicious file content is expected to be low, about 10% of the total files. For practical purposes, it is unclear as to what the corresponding percentage in the training set should be. Our results indicate that greater than 95% accuracy can be achieved through the use of a training set that has a malicious file content of less than 33.3%.


international joint conference on neural network | 2006

Application of Artificial Neural Networks Techniques to Computer Worm Detection

Dima Stopel; Zvi Boger; Robert Moskovitch; Yuval Shahar; Yuval Elovici

Detecting computer worms is a highly challenging task. Commonly this task is performed by antivirus software tools that rely on prior explicit knowledge of the worms code, which is represented by signatures. We present a new approach based on artificial neural networks (ANN) for detecting the presence of computer worms based on the computers behavioral measures. In order to evaluate the new approach, several computers were infected with seven different worms and more than sixty different parameters of the infected computers were measured. The ANN and two other known classifications techniques, decision tree and k-nearest neighbors, were used to test their ability to classify correctly the presence, and the type, of the computer worms even during heavy user activity on the infected computers. The comparisons between the three approaches suggest that the ANN approach have computational advantages when real-time computation is needed, and has the potential to detect previously unknown worms. In addition, ANN may be used to identify the most relevant, measurable, features and thus reduce the feature dimensionality.


intelligence and security informatics | 2007

Host Based Intrusion Detection using Machine Learning

Robert Moskovitch; Shay Pluderman; Ido Gus; Dima Stopel; Clint Feher; Yisrael Parmet; Yuval Shahar; Yuval Elovici

Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instances of malcode binary code signatures. During the time between its appearance and an update being sent to anti-virus tools, a new worm can infect many computers and cause significant damage. We present a new host-based intrusion detection approach, based on analyzing the behavior of the computer to detect the presence of unknown malicious code. The new approach consists on classification algorithms that learn from previous known malcode samples which enable the detection of an unknown malcode. We performed several experiments to evaluate our approach, focusing on computer worms being activated on several computer configurations while running several programs in order to simulate background activity. We collected 323 features in order to measure the computer behavior. Four classification algorithms were applied on several feature subsets. The average detection accuracy that we achieved was above 90% and for specific unknown worms even above 99%.


KI '07 Proceedings of the 30th annual German conference on Advances in Artificial Intelligence | 2007

Improving the Detection of Unknown Computer Worms Activity Using Active Learning

Robert Moskovitch; Nir Nissim; Dima Stopel; Clint Feher; Roman Englert; Yuval Elovici

Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, after the appearance of a new worm on the Web there is a significant delay until an update carrying the worms signature is distributed to anti-virus tools. We propose an innovative technique for detecting the presence of an unknown worm, based on the computer operating system measurements. We monitored 323 computer features and reduced them to 20 features through feature selection. Support vector machines were applied using 3 kernel functions. In addition we used active learning as a selective sampling method to increase the performance of the classifier, exceeding above 90% mean accuracy, and for specific unknown worms 94% accuracy.


Neural Computing and Applications | 2009

Using artificial neural networks to detect unknown computer worms

Dima Stopel; Robert Moskovitch; Zvi Boger; Yuval Shahar; Yuval Elovici

Detecting computer worms is a highly challenging task. We present a new approach that uses artificial neural networks (ANN) to detect the presence of computer worms based on measurements of computer behavior. We compare ANN to three other classification methods and show the advantages of ANN for detection of known worms. We then proceed to evaluate ANN’s ability to detect the presence of an unknown worm. As the measurement of a large number of system features may require significant computational resources, we evaluate three feature selection techniques. We show that, using only five features, one can detect an unknown worm with an average accuracy of 90%. We use a causal index analysis of our trained ANN to identify rules that explain the relationships between the selected features and the identity of each worm. Finally, we discuss the possible application of our approach to host-based intrusion detection systems.


computational intelligence and data mining | 2007

Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining

Robert Moskovitch; Ido Gus; Shay Pluderman; Dima Stopel; Clint Feher; Chanan Glezer; Yuval Shahar; Yuval Elovici

Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, after the appearance of a new worm on the Web there is a significant delay until an update carrying the worms signature is distributed to anti-virus tools. During this time interval a new worm can infect many computers and cause significant damage. We propose an innovative technique for detecting the presence of an unknown worm, not necessarily by recognizing specific instances of the worm, but rather based on the computer measurements. We designed an experiment to test the new technique employing several computer configurations and background applications activity. During the experiments 323 computer features were monitored. Four feature selection techniques were used to reduce the amount of features and four classification algorithms were applied on the resulting feature subsets. Our results indicate that using this approach resulted in exceeding 90% mean accuracy, and for specific unknown worms accuracy reached above 99%, using just 20 features while maintaining a low level of false positive rate.


Archive | 2007

Method and system for detecting malicious behavioral patterns in a computer, using machine learning

Robert Moskovitch; Dima Stopel; Zvi Boger; Yuval Shahar; Yuval Elovici


World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering | 2008

Improving Worm Detection with Artificial Neural Networks through Feature Selection and Temporal Analysis Techniques

Dima Stopel; Zvi Boger; Robert Moskovitch; Yuval Shahar; Yuval Elovici


intelligent data analysis | 2007

Temporal Discretization of medical time series - A comparative study

Revital Azulay; Robert Moskovitch; Dima Stopel; Marion Verduijn; Evert de Jonge; Yuval Shahar; Carlo Combi; Allan Tucker

Collaboration


Dive into the Dima Stopel's collaboration.

Top Co-Authors

Avatar

Robert Moskovitch

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Yuval Elovici

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Yuval Shahar

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Clint Feher

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Zvi Boger

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Nir Nissim

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Ido Gus

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Shay Pluderman

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Evert de Jonge

Leiden University Medical Center

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge