{"id":16197,"date":"2019-09-15T13:18:32","date_gmt":"2019-09-15T17:18:32","guid":{"rendered":"https:\/\/bangla.salearningschool.com\/recent-posts\/machine-learning-and-security-basics\/"},"modified":"2019-09-15T13:18:32","modified_gmt":"2019-09-15T17:18:32","slug":"machine-learning-and-security-basics","status":"publish","type":"post","link":"http:\/\/bangla.sitestree.com\/?p=16197","title":{"rendered":"Machine Learning and Security Basics"},"content":{"rendered":"<p><strong>Machine Learning and Security Basics<\/strong><\/p>\n<p>Objective: Define\/describe key concepts on what Machine Learning can do for Security and how<\/p>\n<p><strong>First of all, what are security threats?<\/strong><br \/>\nMalware, Worm, Trojan, Spyware, Adware, Ransomware, Rootkit, Backdoor, Bot, Botnet, Exploit, Scanning (port scanning), Sniffing (silently observe and record), Keylogger, Spam, Login Attack, Account Take Over, Phising (masquerading), Spear phising, Social Engineering, Incendiary Speech, Denial of Service, Distributed Denial of Service, Advanced persistent threats (APTs), Zero day vulnerability.<\/p>\n<p><strong>Then Cyber Threat Taxonomy:<\/strong><br \/>\nInformation gathering (Scan, Sniff, Social engineering)<br \/>\nIntrusion Attempts<br \/>\nIntrusions (Account Takeover, Privilege escalation, bot, application compromise)<br \/>\nFraud (Unauthorized use of Resources)<br \/>\nAbusive Content (Spam, &#8230;)<br \/>\nMalware (Virus, Trojan)<br \/>\nAvailability Attacks (DoS)<\/p>\n<p><strong>What is the motivation behind cyber attacks?<\/strong><br \/>\nThere can be many reasons including monetary gain, power and political gain\/control.<\/p>\n<p><strong>What is Machine Learning?<\/strong><br \/>\nSimply, Programs that learn from data, adapt with data changes, then form models and algorithms to utilize that learning for a goal (such as prevent security attacks)<\/p>\n<p><strong>How and where machine Learning can help in Security:<\/strong><br \/>\nSome examples can be: Pattern Recognition and Anomaly detection, Malware and botnet detection and analysis, Spam Fighting<\/p>\n<p><strong>How does Machine Learning help in Security?<\/strong><br \/>\nExamples can be: Using classification and clustering events\/incidents\/contents into security categories\/classes\/levels and taking proper actions to mitigate the effect or to prevent future incidents.<\/p>\n<p><strong>Where and how can Machine Learning help with Security?<\/strong><br \/>\nMachine Learning can help in Anomaly Detection, Malware Analysis, Network Traffic Analysis, Protecting the Consumer web, also protecting and adapting itself from security attacks.<\/p>\n<p><strong>What are the Machine Learning Approaches and Concepts that can help with Security?<\/strong><br \/>\nThese will be primarily classification, clustering, and prediction approaches and algorithms. The way Machine Learning will work, it will analyze past logs, emails, login attempts, inbound and outbound requests, then find patterns, then create algorithms (i.e. find\/customize and apply proper ML algorithms ) based on those patterns. With training data and test data, fine tune the model. The following algorithms can be applied for Security as well: Logistic Regression, Decision Trees, Decision Forests, Support Vector Machines, Naive Bayes, KNN, Neural Networks.<\/p>\n<p>However, feature selection and feature engineering with selection of the proper model and algorithms will be critical.<\/p>\n<p>Will continue&#8230;<br \/>\nSayed Ahmed<\/p>\n<p>Linkedin: <a href=\"https:\/\/ca.linkedin.com\/in\/sayedjustetc\">https:\/\/ca.linkedin.com\/in\/sayedjustetc<\/a><\/p>\n<p>Blog: <a href=\"http:\/\/sitestree.com\">http:\/\/sitestree.com<\/a>, <a href=\"http:\/\/bangla.salearningschool.com\">http:\/\/bangla.salearningschool.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Machine Learning and Security Basics Objective: Define\/describe key concepts on what Machine Learning can do for Security and how First of all, what are security threats? Malware, Worm, Trojan, Spyware, Adware, Ransomware, Rootkit, Backdoor, Bot, Botnet, Exploit, Scanning (port scanning), Sniffing (silently observe and record), Keylogger, Spam, Login Attack, Account Take Over, Phising (masquerading), Spear &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"http:\/\/bangla.sitestree.com\/?p=16197\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[182],"tags":[],"class_list":["post-16197","post","type-post","status-publish","format-standard","hentry","category---blog","item-wrap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":26199,"url":"http:\/\/bangla.sitestree.com\/?p=26199","url_meta":{"origin":16197,"position":0},"title":"Machine Learning and Security Basics #Root","author":"Author-Check- Article-or-Video","date":"April 19, 2021","format":false,"excerpt":"Machine Learning and Security Basics Objective: Define\/describe key concepts on what Machine Learning can do for Security and how First of all, what are security threats? Malware, Worm, Trojan, Spyware, Adware, Ransomware, Rootkit, Backdoor, Bot, Botnet, Exploit, Scanning (port scanning), Sniffing (silently observe and record), Keylogger, Spam, Login Attack, Account\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26260,"url":"http:\/\/bangla.sitestree.com\/?p=26260","url_meta":{"origin":16197,"position":1},"title":"Do you want to be an information security professional? #Root","author":"Author-Check- Article-or-Video","date":"April 21, 2021","format":false,"excerpt":"Do you want to be an information security professional or an Ethical Hacker? Then you can learn by finding answers to the following questions. You can search Google, read book, or even ask the security professionals around you to get the answers. Knowing these (and doing\/practicing\/analyzing\/thinking\/applying\/building\/relating) for sure will help.\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26197,"url":"http:\/\/bangla.sitestree.com\/?p=26197","url_meta":{"origin":16197,"position":2},"title":"Hacking Basics: Short Overview: A Short Breadth #Root","author":"Author-Check- Article-or-Video","date":"April 19, 2021","format":false,"excerpt":"Hacking Basics: Short Overview: A Short Breadth Audience: Ethical Hackers, Wanna be security researchers, interested to know the basics of Security Objective: Identify the key hacking concepts. Just the names primarily. key Topics: Password Cracking, Keyloggers, Trojans, Viruses, Worms, Rootkits, Social Engineering, Privilege Escalation, Denial of service attack, Botnet, Alternate\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":65954,"url":"http:\/\/bangla.sitestree.com\/?p=65954","url_meta":{"origin":16197,"position":3},"title":"SCEA:Security in Java: Potential threats to a system and how to address the threats:Java Enterprise Architect #Java Short Notes","author":"Author-Check- Article-or-Video","date":"July 18, 2021","format":false,"excerpt":"Input Validation Failures: Input should be validated both at the client end and the server end (before any processing). Validating both from trusted and untrusted sources is important. Otherwise code injection attack may happen. Validation should include: data type (string, integer), format, length, range, null-value handling, verifying for character-set, locale,\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26195,"url":"http:\/\/bangla.sitestree.com\/?p=26195","url_meta":{"origin":16197,"position":4},"title":"Where to get Malware Samples and Labels? #Root","author":"Author-Check- Article-or-Video","date":"April 19, 2021","format":false,"excerpt":"Where to get Malware Samples and Labels? This information is intended for Security and Malware researchers. Virus Total: https:\/\/www.virustotal.com\/gui\/ Malware-traffic-analysis-net: http:\/\/malware-traffic-analysis.net\/ Virus Share : https:\/\/virusshare.com\/ VX Haven: https:\/\/vxer.org Kaggle, Microsoft Virus\/Malware database: https:\/\/www.kaggle.com\/c\/microsoft-malware-prediction\/data Reference: Clarence C, and David F. From: http:\/\/sitestree.com\/where-to-get-malware-samples-and-labels\/ Categories:RootTags: Post Data:2019-09-13 20:08:22 Shop Online: https:\/\/www.ShopForSoul.com\/ (Big Data,\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26189,"url":"http:\/\/bangla.sitestree.com\/?p=26189","url_meta":{"origin":16197,"position":5},"title":"Firewall, Security, and Misc #Root","author":"Author-Check- Article-or-Video","date":"April 19, 2021","format":false,"excerpt":"Nmap and Port Scanning https:\/\/nmap.org\/book\/man-port-scanning-techniques.html MacOs Commands: nmap localhost lsof -i :5955 --- MacOS Network Utility https:\/\/wilsonmar.github.io\/ports-open\/ --- Port 49152 https:\/\/www.speedguide.net\/port.php?port=49152 --- MacOs: Close the Ports and Firewall https:\/\/www.macworld.com\/article\/1132558\/connect2504.html --- From: https:\/\/sitestree.com\/firewall-security-and-misc\/ Categories:RootTags: Post Data:2019-09-07 14:11:40 Shop Online: https:\/\/www.ShopForSoul.com\/ (Big Data, Cloud, Security, Machine Learning): Courses: http:\/\/Training.SitesTree.com In Bengali: http:\/\/Bangla.SaLearningSchool.com\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/16197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16197"}],"version-history":[{"count":0,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/16197\/revisions"}],"wp:attachment":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16197"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}