- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 322字
- 2021-06-24 12:29:00
How it works...
The first step involves simply loading the necessary libraries that will allow us to manipulate data quickly and easily. In steps 2 and 3, we generate a training and testing set consisting of normal observations. These have the same distributions. In step 4, on the other hand, we generate the remainder of our testing set by creating outliers. This anomalous dataset has a different distribution from the training data and the rest of the testing data. Plotting our data, we see that some outlier points look indistinguishable from normal points (step 5). This guarantees that our classifier will have a significant percentage of misclassifications, due to the nature of the data, and we must keep this in mind when evaluating its performance. In step 6, we fit an instance of Isolation Forest with default parameters to the training data.
Note that the algorithm is fed no information about the anomalous data. We use our trained instance of Isolation Forest to predict whether the testing data is normal or anomalous, and similarly to predict whether the anomalous data is normal or anomalous. To examine how the algorithm performs, we append the predicted labels to X_outliers (step 7) and then plot the predictions of the Isolation Forest instance on the outliers (step 8). We see that it was able to capture most of the anomalies. Those that were incorrectly labeled were indistinguishable from normal observations. Next, in step 9, we append the predicted label to X_test in preparation for analysis and then plot the predictions of the Isolation Forest instance on the normal testing data (step 10). We see that it correctly labeled the majority of normal observations. At the same time, there was a significant number of incorrectly classified normal observations (shown in red).
Depending on how many false alarms we are willing to tolerate, we may need to fine-tune our classifier to reduce the number of false positives.
- 大數(shù)據(jù)戰(zhàn)爭:人工智能時代不能不說的事
- Hadoop 2.x Administration Cookbook
- 云原生架構(gòu)進階實戰(zhàn)
- DevOps Bootcamp
- Cloud Security Automation
- Mastering GitLab 12
- 嵌入式Linux系統(tǒng)實用開發(fā)
- 大數(shù)據(jù)案例精析
- 簡明學(xué)中文版Photoshop
- 21天學(xué)通Linux嵌入式開發(fā)
- C#求職寶典
- 基于Proteus的PIC單片機C語言程序設(shè)計與仿真
- 中國戰(zhàn)略性新興產(chǎn)業(yè)研究與發(fā)展·數(shù)控系統(tǒng)
- ADuC系列ARM器件應(yīng)用技術(shù)
- 基于Quartus Ⅱ的數(shù)字系統(tǒng)Verilog HDL設(shè)計實例詳解