- Mastering Machine Learning for Penetration Testing
- Chiheb Chebbi
- 299字
- 2021-06-25 21:03:07
Machine learning in penetration testing - promises and challenges
Machine learning is now a necessary aspect of every modern project. Combining mathematics and cutting-edge optimization techniques and tools can provide amazing results. Applying machine learning and analytics to information security is a step forward in defending against advanced real-world attacks and threats.
Hackers are always trying to use new, sophisticated techniques to attack modern organizations. Thus, as security professionals, we need to keep ourselves updated and deploy the required safeguards to protect assets. Many researchers have shown thousands of proposals to build defensive systems based on machine learning techniques. For example, the following are some information security models:
- Supervised learning:
- Network traffic profiling
- Spam filtering
- Malware detection
- Semi-supervised learning:
- Network anomaly detection
- C2 detection
- Unsupervised learning:
- User behavior analytics
- Insider threat detection
- Malware family identification
As you can see, there are great applications to help protect the valuable assets of modern organizations. But generally, black hat hackers do not use classic techniques anymore. Nowadays, the use of machine learning techniques is shifting from defensive techniques to offensive systems. We are moving from a defensive to an offensive position. In fact, building defensive layers with artificial intelligence and machine learning alone is not enough; having an understanding of how to leverage those techniques to perform ferocious attacks is needed, and should be added to your technical skills when performing penetration testing missions. Adding offensive machine learning tools to your pentesting arsenal is very useful when it comes to simulating cutting-edge attacks. While a lot of these offensive applications are still for research purposes, we will try to build our own projects, to get a glimpse of how attackers are building offensive tools and cyber weapons to attack modern companies. Maybe you can use them later, in your penetration testing operations.
- 物聯(lián)網(wǎng)智慧安監(jiān)技術(shù)
- INSTANT PhpStorm Starter
- 網(wǎng)絡(luò)故障現(xiàn)場處理實踐(第4版)
- Hands-On Chatbots and Conversational UI Development
- OpenLayers Cookbook
- 城域網(wǎng)與廣域網(wǎng)(第2版)
- 網(wǎng)管員必讀:網(wǎng)絡(luò)管理(第2版)
- 網(wǎng)絡(luò)工程實施技術(shù)與方案大全
- 從實踐中學習手機抓包與數(shù)據(jù)分析
- INSTANT LinkedIn Customization How-to
- 華為HCIA-Datacom認證指南
- 智能物聯(lián)網(wǎng):區(qū)塊鏈與霧計算融合應(yīng)用詳解
- Python Web Scraping Cookbook
- 萬物互聯(lián):物聯(lián)網(wǎng)核心技術(shù)與安全
- Telerik WPF Controls Tutorial