官术网_书友最值得收藏!

Using machine learning to detect the file type

One of the techniques hackers use to sneak their malicious files into security systems is to obfuscate their file types. For example, a (malicious) PowerShell script is expected to have an extension, .ps1. A system administrator can aim to combat the execution of all PowerShell scripts on a system by preventing the execution of all files with the .ps1 extension. However, the mischievous hacker can remove or change the extension, rendering the file's identity a mystery. Only by examining the contents of the file can it then be distinguished from an ordinary text file. For practical reasons, it is not possible for humans to examine all text files on a system. Consequently, it is expedient to resort to automated methods. In this chapter, we will demonstrate how you can use machine learning to detect the file type of an unknown file. Our first step is to curate a dataset.

主站蜘蛛池模板: 会昌县| 宜丰县| 隆尧县| 龙口市| 永嘉县| 高雄县| 敦煌市| 聂拉木县| 礼泉县| 南乐县| 方正县| 安西县| 肇东市| 志丹县| 四川省| 巫溪县| 太谷县| 马尔康县| 古田县| 沅江市| 七台河市| 富民县| 靖远县| 永川市| 白山市| 应城市| 亚东县| 深泽县| 班玛县| 天祝| 台中县| 乌鲁木齐县| 铜陵市| 邳州市| 兴和县| 罗源县| 黎城县| 丰县| 台中县| 潮州市| 天长市|