官术网_书友最值得收藏!

Using machine learning to detect the file type

One of the techniques hackers use to sneak their malicious files into security systems is to obfuscate their file types. For example, a (malicious) PowerShell script is expected to have an extension, .ps1. A system administrator can aim to combat the execution of all PowerShell scripts on a system by preventing the execution of all files with the .ps1 extension. However, the mischievous hacker can remove or change the extension, rendering the file's identity a mystery. Only by examining the contents of the file can it then be distinguished from an ordinary text file. For practical reasons, it is not possible for humans to examine all text files on a system. Consequently, it is expedient to resort to automated methods. In this chapter, we will demonstrate how you can use machine learning to detect the file type of an unknown file. Our first step is to curate a dataset.

主站蜘蛛池模板: 阿拉善左旗| 大同县| 衡山县| 淅川县| 新疆| 延川县| 炎陵县| 新干县| 南充市| 环江| 龙岩市| 定边县| 宁晋县| 金湖县| 涟源市| 文山县| 凤山市| 乌兰察布市| 深州市| 中方县| 博兴县| 大悟县| 台前县| 水富县| 凤庆县| 遂宁市| 德江县| 凌云县| 铜川市| 炉霍县| 孝昌县| 开封市| 忻州市| 浦东新区| 佳木斯市| 丹东市| 中超| 兴宁市| 荆门市| 黑龙江省| 东丽区|