- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 173字
- 2021-06-24 12:28:57
How it works...
We start by importing our dataset of PE header information from a collection of samples (step 1). This dataset consists of two classes of PE files: malware and benign. We then use plotly to create a nice-looking interactive 3D graph (step 1). We proceed to prepare our dataset for machine learning. Specifically, in step 2, we set X as the features and y as the classes of the dataset. Based on the fact that there are two classes, we aim to cluster the data into two groups that will match the sample classification. We utilize the K-means algorithm (step 3), about which you can find more information at: https://en.wikipedia.org/wiki/K-means_clustering. With a thoroughly trained clustering algorithm, we are ready to predict on the testing set. We apply our clustering algorithm to predict to which cluster each of the samples should belong (step 4). Observing our results in step 5, we see that clustering has captured a lot of the underlying information, as it was able to fit the data well.
- PPT,要你好看
- 嵌入式系統(tǒng)應(yīng)用
- 手把手教你玩轉(zhuǎn)RPA:基于UiPath和Blue Prism
- 圖形圖像處理(Photoshop)
- 返璞歸真:UNIX技術(shù)內(nèi)幕
- 模型制作
- 21天學(xué)通ASP.NET
- 機(jī)器人創(chuàng)新實(shí)訓(xùn)教程
- Implementing Oracle API Platform Cloud Service
- Red Hat Linux 9實(shí)務(wù)自學(xué)手冊(cè)
- INSTANT VMware vCloud Starter
- 實(shí)戰(zhàn)Windows Azure
- 單片機(jī)C51應(yīng)用技術(shù)
- 新世紀(jì)Photoshop CS6中文版應(yīng)用教程
- Arduino創(chuàng)意機(jī)器人入門:基于Mind+