![]() ![]() To fight this I've started collecting my own data to work on. If the data isn't proprly cleaned you can leak sensitive data or private communications. THis data is rare for good reason! Getting access to someone's network traffic gives you a lot of information about how they work and what they do. There are a few interesting sets like the Darpa Intrusion dataset, but they are few and far between. ![]() Unfortunately, datasets for building these kinds of models is scarce. Other than the usual precautions one might take against malware/network intrusion such as antivirus software, password managers, always using the latest firmware on routers and IOT.I've also been training models to detect beacons (periodic communications between malware and command and control servers) and DGA (domain generating algorithms). Recently I've been playing around with what I call "hobbyist cyber security". ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |