官术网_书友最值得收藏!

Using machine learning to detect the file type

One of the techniques hackers use to sneak their malicious files into security systems is to obfuscate their file types. For example, a (malicious) PowerShell script is expected to have an extension, .ps1. A system administrator can aim to combat the execution of all PowerShell scripts on a system by preventing the execution of all files with the .ps1 extension. However, the mischievous hacker can remove or change the extension, rendering the file's identity a mystery. Only by examining the contents of the file can it then be distinguished from an ordinary text file. For practical reasons, it is not possible for humans to examine all text files on a system. Consequently, it is expedient to resort to automated methods. In this chapter, we will demonstrate how you can use machine learning to detect the file type of an unknown file. Our first step is to curate a dataset.

主站蜘蛛池模板: 达日县| 东山县| 舟山市| 西城区| 佛冈县| 石城县| 大安市| 连南| 临洮县| 岑溪市| 黄石市| 龙游县| 三河市| 宜都市| 福州市| 图片| 河南省| 师宗县| 团风县| 宁城县| 米易县| 南城县| 仁布县| 富锦市| 大渡口区| 阿鲁科尔沁旗| 苗栗市| 瑞金市| 沅陵县| 遂宁市| 石棉县| 中西区| 高雄县| 苗栗县| 腾冲县| 文山县| 河间市| 阿尔山市| 准格尔旗| 西乌珠穆沁旗| 新宁县|