- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 162字
- 2021-06-24 12:29:08
How it works...
This scenario simulates tampering with a file and then utilizing similarity hashing to detect the existence of tampering, as well as measuring the size of the delta. We begin with a vanilla Python executable and then tamper with it by adding a null byte at the end (step 1). In real life, a hacker may take a legitimate program and insert malicious code into the sample. We double-checked that the tempering was successful and examined its nature using a hexdump in step 2. We then ran a similarity computation using similarity hashing on the original and tempered file, to observe that a minor alteration took place (step 3). Utilizing only standard hashing, we would have no idea how the two files are related, other than to conclude that they are not the same file. Knowing how to compare files allows us to cluster malware and benign files in machine learning algorithms, as well as group them into families.
- 大數(shù)據(jù)項(xiàng)目管理:從規(guī)劃到實(shí)現(xiàn)
- Practical Ansible 2
- JavaScript實(shí)例自學(xué)手冊(cè)
- WOW!Illustrator CS6完全自學(xué)寶典
- JMAG電機(jī)電磁仿真分析與實(shí)例解析
- 工業(yè)機(jī)器人入門(mén)實(shí)用教程(KUKA機(jī)器人)
- Supervised Machine Learning with Python
- AWS Administration Cookbook
- MATLAB/Simulink權(quán)威指南:開(kāi)發(fā)環(huán)境、程序設(shè)計(jì)、系統(tǒng)仿真與案例實(shí)戰(zhàn)
- Practical Big Data Analytics
- FPGA/CPLD應(yīng)用技術(shù)(Verilog語(yǔ)言版)
- 中文版AutoCAD 2013高手速成
- Unreal Development Kit Game Design Cookbook
- Data Analysis with R(Second Edition)
- PHP求職寶典