Applying ML to InfoSec: Adversarial ML
Some of these sources (like log formats) are readily available and fairly standardized while others will require extensive tooling and software modifications (e.g. Bearing in mind that the whole point of machine learning is generalization beyond the training set, thoughtful feature engineering is required to go from the identity information of IP addresses, hostnames and URLs to something that can turn into a useful representation within the machine learning model.
Dec-8-2016, 17:35:02 GMT