Abstract
With an increasing amount of generated information, also within security domains, there is a growing need for tools that can assist with automatic security classification. The state-of-the art today is the use of simple classification lists (“dirty word lists”) for reactive content checking. In the future, however, we expect there will be both proactive tools for security classification (assisting humans when creating the information object) and reactive tools (i.e. double-checking the content in a guard). This paper demonstrates the use of machine learning with Lasso (Least Absolute Shrinkage and Selection Operator) [1, 2] both to two-class (binary) and multi-class security classification. We also explore the ability of Lasso to create sparse solutions that are easy for humans to analyze and interpret, in contrast to many other machine learning techniques that do not possess an explanatory nature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tibshirani, R.: Regression shrinkage and selection via the lasso. J. Royal. Statist. Soc B. 58(1), 267–288 (1996)
Friedman, J., Hastie, T., Tibshirani, R.: Regularization paths for generalized linear models via coordinate descent. J. Stat. Softw. 33(1), 1–22 (2010). http://www.jstatsoft.org/v33/i01/
Nicolls, W.: Implementing company classification policy with the S/MIME security label. RFC 3114, IETF, May 2002
UCDMO. Ucdmo cross domain baseline list. http://www.crossdomain.org (2011). Accessed 26 March 2015
Brown, J.D., Charlebois, D.: Security classification using automated learning (scale), DRDC Ottawa CR, Technical Report (2010)
Entezari-Maleki, C., Rezaei, A., Minaei-Bidgoli, B.: Comparison of classification methods based on the type of attributes and sample size. J. Convergence Inf. Technol. 4(3), 94–102 (2009)
Kotsiantis, S.B.: Supervised machine learning: A review of classification techniques. Informatica 31, 249–268 (2007)
Mathkour, H., Touir, A., Al-Sanie, W.: Automatic information classifier using rhetorical structure theory. In: Kłopotek, M.A., Wierzchoń, S.T., Trojanowski, K. (eds.) Intelligent Information Processing and Web Mining. Advances in Soft Computing, vol. 31, pp. 229–236. Springer, Heidelberg (2005)
Clark, K.: Automated security classification. Master’s thesis, Vrije Universiteit (2008)
Digitial national security archive. http://nsarchive.chadwyck.com/home.do. Accessed 26 March 2015
Abbyy. http://www.abbyy.com/. Accessed 26 March 2015
Baeza-Yates, R., Ribeiro-Neto, B., et al.: Modern Information Retrieval, vol. 463. ACM Press, New York (1999)
Acknowledgments
This work was partially funded by the University Graduate Center (UNIK).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Engelstad, P.E., Hammer, H., Kongsgård, K.W., Yazidi, A., Nordbotten, N.A., Bai, A. (2016). Automatic Security Classification with Lasso. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-31875-2_33
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31874-5
Online ISBN: 978-3-319-31875-2
eBook Packages: Computer ScienceComputer Science (R0)