- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 298字
- 2021-06-24 12:29:09
How it works…
Unlike the previous recipe, in which we analyzed a single file's N-grams, in this recipe, we look at a large collection of files to understand which N-grams are the most informative features. We start by specifying the folders containing our samples, our value of N, and import some modules to enumerate files (step 1). We proceed to count all N-grams from all files in our dataset (step 2). This allows us to find the globally most frequent N-grams. Of these, we filter down to the K1=1000 most frequent ones (step 3). Next, we introduce a helper method, featurizeSample, to be used to take a sample and output the number of appearances of the K1 most common N-grams in its byte sequence (step 4). We then iterate through our directories of files, and use the previous featurizeSample function to featurize our samples, as well as record their labels, as malicious or benign (step 5). The importance of the labels is that the assessment of whether an N-gram is informative depends on being able to discriminate between the malicious and benign classes based on it.
We import the SelectKBest library to select the best features via a score function, and the two score functions, mutual information and chi-squared (step 6). Finally, we apply the three different feature selection schemes to select the best N-grams and apply this knowledge to transform our features (step 7). In the first method, we simply select the K2 most frequent N-grams. Note that the selection of this method is often recommended in the literature, and is easier because of not requiring labels or extensive computation. In the second method, we use mutual information to narrow down the K2 features, while in the third, we use chi-squared to do so.
- Mastering Proxmox(Third Edition)
- 數(shù)據(jù)挖掘?qū)嵱冒咐治?/a>
- PostgreSQL Administration Essentials
- DevOps:Continuous Delivery,Integration,and Deployment with DevOps
- 單片機C語言應(yīng)用100例
- 基于Xilinx ISE的FPAG/CPLD設(shè)計與應(yīng)用
- 空間站多臂機器人運動控制研究
- 貫通Java Web開發(fā)三劍客
- Dreamweaver CS6精彩網(wǎng)頁制作與網(wǎng)站建設(shè)
- Excel 2010函數(shù)與公式速查手冊
- Windows安全指南
- HBase Essentials
- 企業(yè)級Web開發(fā)實戰(zhàn)
- PowerPoint 2010幻燈片制作高手速成
- Flink內(nèi)核原理與實現(xiàn)