DNSFilter Chief Data Scientist: Where we're going, we don't need (negative) labels

Have you ever tried to build a machine learning classifier where you only had labels for one of the classes?

In computer security, researchers usually have easy access only to labels for malicious samples (malware, phishing domains, etc.), while labels for benign samples (productivity software, e-commerce domains, etc.) are missing entirely—or they are tedious and expensive to collect at scale. Typically, this leads to researchers regarding the “known bad” samples as malicious, while the rest is presumed to be benign.

In recent research published by DNSFilter's Chief Data Scientist, David Elkind, we show that this solution leads to a biased model when compared to an alternative procedure which removes the malicious-but-unlabeled samples from the training set. We show significant improvements in model quality on two different computer security datasets.

Click the button below to read the full research paper. For additional materials, including the code and CAMLIS 2024 poster David presented on October 24, visit GitHub here.

Search
  • There are no suggestions because the search field is empty.
Latest posts
Super Bowl Sunday Saw a 57% Rise in Malicious Gambling Content Super Bowl Sunday Saw a 57% Rise in Malicious Gambling Content

A report by DNSFilter found that Super Bowl Sunday saw a 57% rise in malicious gambling and betting content. There was a 15% increase in illegal streaming and torrenting traffic related to fake streaming sites during championship weekend compared to the previous average held between May and December 2024, indicating an escalating risk of security issues tied to streaming during major NFL events.

DNSFilter Data Reveals Dangers to Fake Gambling Sites and Illegal Streaming In Lead Up to Super Bowl LIX DNSFilter Data Reveals Dangers to Fake Gambling Sites and Illegal Streaming In Lead Up to Super Bowl LIX

Cybersecurity firm shows spikes in malicious traffic leading up to and during high-profile sporting events

Part 2: TK Keanini featured in ITPro Today Cybersecurity Trends and Predictions 2025 Part 2: TK Keanini featured in ITPro Today Cybersecurity Trends and Predictions 2025

By 2025, zero trust will be the dominant architecture model, fully replacing outdated perimeter-based models. Security controls will focus increasingly on the workforce and workloads rather than just the workplace, leading to enhanced protection across diverse environments.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.