Skip to main content

Automatic Security Classification with Lasso

  • Conference paper
Information Security Applications (WISA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9503))

Included in the following conference series:

Abstract

With an increasing amount of generated information, also within security domains, there is a growing need for tools that can assist with automatic security classification. The state-of-the art today is the use of simple classification lists (“dirty word lists”) for reactive content checking. In the future, however, we expect there will be both proactive tools for security classification (assisting humans when creating the information object) and reactive tools (i.e. double-checking the content in a guard). This paper demonstrates the use of machine learning with Lasso (Least Absolute Shrinkage and Selection Operator) [1, 2] both to two-class (binary) and multi-class security classification. We also explore the ability of Lasso to create sparse solutions that are easy for humans to analyze and interpret, in contrast to many other machine learning techniques that do not possess an explanatory nature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tibshirani, R.: Regression shrinkage and selection via the lasso. J. Royal. Statist. Soc B. 58(1), 267–288 (1996)

    MathSciNet  MATH  Google Scholar 

  2. Friedman, J., Hastie, T., Tibshirani, R.: Regularization paths for generalized linear models via coordinate descent. J. Stat. Softw. 33(1), 1–22 (2010). http://www.jstatsoft.org/v33/i01/

    Article  Google Scholar 

  3. Nicolls, W.: Implementing company classification policy with the S/MIME security label. RFC 3114, IETF, May 2002

    Google Scholar 

  4. UCDMO. Ucdmo cross domain baseline list. http://www.crossdomain.org (2011). Accessed 26 March 2015

  5. Brown, J.D., Charlebois, D.: Security classification using automated learning (scale), DRDC Ottawa CR, Technical Report (2010)

    Google Scholar 

  6. Entezari-Maleki, C., Rezaei, A., Minaei-Bidgoli, B.: Comparison of classification methods based on the type of attributes and sample size. J. Convergence Inf. Technol. 4(3), 94–102 (2009)

    Article  Google Scholar 

  7. Kotsiantis, S.B.: Supervised machine learning: A review of classification techniques. Informatica 31, 249–268 (2007)

    MathSciNet  MATH  Google Scholar 

  8. Mathkour, H., Touir, A., Al-Sanie, W.: Automatic information classifier using rhetorical structure theory. In: Kłopotek, M.A., Wierzchoń, S.T., Trojanowski, K. (eds.) Intelligent Information Processing and Web Mining. Advances in Soft Computing, vol. 31, pp. 229–236. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Clark, K.: Automated security classification. Master’s thesis, Vrije Universiteit (2008)

    Google Scholar 

  10. Digitial national security archive. http://nsarchive.chadwyck.com/home.do. Accessed 26 March 2015

  11. Abbyy. http://www.abbyy.com/. Accessed 26 March 2015

  12. Baeza-Yates, R., Ribeiro-Neto, B., et al.: Modern Information Retrieval, vol. 463. ACM Press, New York (1999)

    Google Scholar 

Download references

Acknowledgments

This work was partially funded by the University Graduate Center (UNIK).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paal E. Engelstad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Engelstad, P.E., Hammer, H., Kongsgård, K.W., Yazidi, A., Nordbotten, N.A., Bai, A. (2016). Automatic Security Classification with Lasso. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31875-2_33

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31874-5

  • Online ISBN: 978-3-319-31875-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics