- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 229字
- 2021-06-24 12:29:05
How it works...
At a conceptual level, obtaining dynamic analysis results consists of running samples in environments that allow the analyst to collect runtime information. Cuckoo Sandbox is a flexible framework with prebuilt modules to do just that. We began our recipe for using Cuckoo Sandbox by opening up the web portal (Step 1). A command-line interface (CLI) exists as well. We proceeded to submit a sample and select the type of analysis we wished to perform (Steps 2 and 3). These steps, too, can be performed through the Cuckoo CLI. We proceeded to examine the analysis report (Step 4). You can see at this stage how the many modules of Cuckoo Sandbox reflect in the final analysis output. For instance, if a module for capturing traffic is installed and used, then the report will contain the data captured in the network tab. We proceeded to focus our view of the analysis to behavioral analysis (Step 5), and in particular to observe the sequence of API calls. API calls are basically operations performed by the OS. This sequence makes up a fantastic feature set that we will utilize to detect malware in future recipes. Finally, note that in a production environment, it may make sense to create a custom-made sandbox with custom modules for data collection, as well as equip it with anti-VM detection software to facilitate successful analysis.
- Spark編程基礎(Scala版)
- 商戰數據挖掘:你需要了解的數據科學與分析思維
- Julia 1.0 Programming
- PyTorch深度學習實戰
- SMS 2003部署與操作深入指南
- Machine Learning Algorithms(Second Edition)
- 工業機器人實操進階手冊
- 筆記本電腦維修之電路分析基礎
- 玩機器人 學單片機
- 輸送技術、設備與工業應用
- 探索中國物聯網之路
- 中老年人學數碼照片后期處理
- 服務器配置與應用(Windows Server 2008 R2)
- 數據庫技術:Access 2003 計算機網絡技術
- Building Impressive Presentations with Impress.js