{"id":12045,"date":"2020-01-01T00:00:00","date_gmt":"2020-01-01T08:00:00","guid":{"rendered":"https:\/\/www.hmc.edu\/clinic\/2020\/analyzing-web-usage-data-to-detect-threat-patterns\/"},"modified":"2020-01-01T00:00:00","modified_gmt":"2020-01-01T08:00:00","slug":"analyzing-web-usage-data-to-detect-threat-patterns","status":"publish","type":"post","link":"https:\/\/www.hmc.edu\/clinic\/2020\/analyzing-web-usage-data-to-detect-threat-patterns\/","title":{"rendered":"Analyzing Web Usage Data to Detect Threat Patterns"},"content":{"rendered":"<h2 class=\"project-sponsor-dept-year\"><span class=\"project-sponsor\">Webroot<\/span> <span class=\"project-dept-year\">Computer Science, 2019-20<\/span><\/h2>\n<div class=\"project-team\">\n<p><strong>Liaison(s):<\/strong> Michael Balloni \u201998, Hal Lonas, Trung Tran, Brittany Wang \u201919, Fred Yip<br \/>\n<strong>Advisor(s):<\/strong> Lisa Kaczmarczyk<br \/>\n<strong>Students(s):<\/strong> Jill Cardamon (PM), Nisha Bhatia, Riley Julianne Lin, Riley Mangan<\/p>\n<\/div>\n<div class=\"project-abstract\">\n<p>Webroot provides cybersecurity and threat intelligence services through network, endpoint and cloud-based protection. The goal of our project with Webroot is to explore methods of matching URL fingerprints to identify malicious URLs in real-time. Our Clinic team uses human- and machine-generated features in combination with machine learning models and neural networks to determine the maliciousness of websites. As an end-to-end pipeline, we created a cross-browser extension that identifies the maliciousness of the current URL and visualizes the results.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Webroot Computer Science, 2019-20 Liaison(s): Michael Balloni \u201998, Hal Lonas, Trung Tran, Brittany Wang \u201919, Fred Yip Advisor(s): Lisa Kaczmarczyk [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[140],"tags":[610],"class_list":["post-12045","post","type-post","status-publish","format-standard","hentry","category-computer-science","tag-webroot"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hmc.edu\/clinic\/wp-json\/wp\/v2\/posts\/12045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hmc.edu\/clinic\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hmc.edu\/clinic\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hmc.edu\/clinic\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hmc.edu\/clinic\/wp-json\/wp\/v2\/comments?post=12045"}],"version-history":[{"count":0,"href":"https:\/\/www.hmc.edu\/clinic\/wp-json\/wp\/v2\/posts\/12045\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.hmc.edu\/clinic\/wp-json\/wp\/v2\/media?parent=12045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hmc.edu\/clinic\/wp-json\/wp\/v2\/categories?post=12045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hmc.edu\/clinic\/wp-json\/wp\/v2\/tags?post=12045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}