- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 211字
- 2021-06-24 12:29:04
How it works...
As you can see, in Step 1, we imported the pefile module to enumerate the samples. Once that is done, we define the convenience function, as you can see in Step 2. The reason being that it often imports using varying cases (upper/lower). This causes the same import to appear as distinct imports.
After preprocessing the imports, we then define another function to collect all the imports of a file into a list. We will also define a function to collect the names of the sections of a file in order to standardize these names such as .text, .rsrc, and .reloc while containing distinct parts of the file (Step 3). The files are then enumerated in our folders and empty lists will be created to hold the features we will be extracting. The predefined functions will then collect the imports (Step 4), section names, and the number of sections of each file (Steps 5 and 6). Lastly, a try-catch clause will be defined in case a file's PE header cannot be parsed (Step 7). This can happen for many reasons. One reason being that the file is not actually a PE file. Another reason is that its PE header is intentionally or unintentionally malformed.
- Microsoft Power BI Quick Start Guide
- 軟件架構設計
- CSS全程指南
- CompTIA Network+ Certification Guide
- 水晶石精粹:3ds max & ZBrush三維數字靜幀藝術
- 網絡管理工具實用詳解
- Working with Linux:Quick Hacks for the Command Line
- Mastering Geospatial Analysis with Python
- 手機游戲策劃設計
- PowerMill 2020五軸數控加工編程應用實例
- Linux Shell Scripting Cookbook(Third Edition)
- C#求職寶典
- 30天學通Java Web項目案例開發
- Windows 7來了
- Wireshark Revealed:Essential Skills for IT Professionals