天天看点

关于机器学习和网络安全的一些资料

关于机器学习和网络安全的一些资料

<a href="http://www.secrepo.com/">samples of security related dats</a>

<a href="https://www.ll.mit.edu/ideval/data/">darpa intrusion detection data sets</a>

<a href="https://stratosphereips.org/category/dataset.html">stratosphere ips data sets</a>

<a href="http://csr.lanl.gov/data/">open data sets</a>

<a href="http://www.westpoint.edu/crc/sitepages/datasets.aspx">data capture from national security agency</a>

<a href="https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/cybersecurity/adfa-ids-datasets/">the adfa intrusion detection data sets</a>

<a href="https://github.com/defcom17/nsl_kdd">nsl-kdd data sets</a>

<a href="http://sysnet.ucsd.edu/projects/url/">malicious urls data sets</a>

<a href="http://csr.lanl.gov/data/cyber1/">multi-source cyber-security events</a>

<a href="http://marcoramilli.blogspot.cz/2016/12/malware-training-sets-machine-learning.html">malware training sets: a machine learning dataset for everyone</a>

<a href="https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/melicher">fast, lean, and accurate: modeling password guessability using neural networks</a>

<a href="http://ieeexplore.ieee.org/document/5504793/?reload=true">outside the closed world: on using machine learning for network intrusion detection</a>

<a href="https://link.springer.com/chapter/10.1007/978-3-540-30143-1_11">anomalous payload-based network intrusion detection</a>

<a href="http://dl.acm.org/citation.cfm?id=2420987">malicious pdf detection using metadata and structural features</a>

<a href="https://dl.acm.org/citation.cfm?id=2339697">adversarial support vector machine learning</a>

<a href="https://dl.acm.org/citation.cfm?id=1387709.1387716">exploiting machine learning to subvert your spam filter</a>

<a href="http://www.covert.io/research-papers/security/camp%20-%20content%20agnostic%20malware%20protection.pdf">camp – content agnostic malware protection</a>

<a href="http://www.covert.io/research-papers/security/notos%20-%20building%20a%20dynamic%20reputation%20system%20for%20dns.pdf">notos – building a dynamic reputation system for dns</a>

<a href="http://www.covert.io/research-papers/security/kopis%20-%20detecting%20malware%20domains%20at%20the%20upper%20dns%20hierarchy.pdf">kopis – detecting malware domains at the upper dns hierarchy</a>

<a href="http://www.covert.io/research-papers/security/from%20throw-away%20traffic%20to%20bots%20-%20detecting%20the%20rise%20of%20dga-based%20malware.pdf">pleiades – from throw-away traffic to bots – detecting the rise of dga-based malware</a>

<a href="http://www.covert.io/research-papers/security/exposure%20-%20finding%20malicious%20domains%20using%20passive%20dns%20analysis.pdf">exposure – finding malicious domains using passive dns analysis</a>

<a href="http://www.covert.io/research-papers/security/polonium%20-%20tera-scale%20graph%20mining%20for%20malware%20detection.pdf">polonium – tera-scale graph mining for malware detection</a>

<a href="http://www.covert.io/research-papers/security/nazca%20-%20%20detecting%20malware%20distribution%20in%20large-scale%20networks.pdf">nazca – detecting malware distribution in large-scale networks</a>

<a href="http://www.covert.io/research-papers/security/payl%20-%20anomalous%20payload-based%20network%20intrusion%20detection.pdf">payl – anomalous payload-based network intrusion detection</a>

<a href="http://www.covert.io/research-papers/security/anagram%20-%20a%20content%20anomaly%20detector%20resistant%20to%20mimicry%20attack.pdf">anagram – a content anomaly detector resistant to mimicry attacks</a>

<a href="http://www.covert.io/deep-learning-security-papers/">deep learning security papers</a>

<a href="https://www.researchgate.net/publication/283083699_applications_of_machine_learning_in_cyber_security">applications of machine learning in cyber security</a>

<a href="http://amzn.to/2iuwdyx">data mining and machine learning in cybersecurity</a>

<a href="http://amzn.to/2jnchbs">machine learning and data mining for computer security</a>

<a href="http://amzn.to/2jlpsgm">network anomaly detection: a machine learning perspective</a>

<a href="http://amzn.to/2jybzpo">machine learning for hackers: case studies and algorithms to get you started</a>

<a href="https://www.youtube.com/watch?v=tukidi5vubs">using machine learning to support information security</a>

<a href="https://www.youtube.com/watch?v=36it9vggr0g">defending networks with incomplete information</a>

<a href="https://www.youtube.com/watch?v=vy-jpfpm1au">applying machine learning to network security monitoring</a>

<a href="https://www.youtube.com/watch?v=yg6qlhoawie">measuring the iq of your threat intelligence feeds</a>

<a href="https://www.youtube.com/watch?v=6jmeknes-w0">data-driven threat intelligence: metrics on indicator dissemination and sharing</a>

<a href="https://www.youtube.com/watch?v=dgwh7m4n8de">applied machine learning for data exfil and other fun topics</a>

<a href="https://www.youtube.com/watch?v=tyvcvzejhhq">secure because math: a deep-dive on ml-based monitoring</a>

<a href="https://www.youtube.com/watch?v=jagdpjffm2a">machine duping 101: pwning deep learning systems</a>

<a href="https://www.youtube.com/watch?v=l7u0pdcsklg">delta zero, kingphish3r – weaponizing data science for social engineering</a>

<a href="https://www.youtube.com/watch?v=oius1dyfnd8">defeating machine learning what your security vendor is not telling you</a>

<a href="https://www.youtube.com/watch?v=u6a7afsd39a">crowdsource: crowd trained machine learning model for malware capability det</a>

<a href="https://www.youtube.com/watch?v=sptbdujjhbk">defeating machine learning: systemic deficiencies for detecting malware</a>

<a href="https://www.youtube.com/watch?v=2cqrspfsy-s">packet capture village – theodora titonis – how machine learning finds malware</a>

<a href="https://www.youtube.com/watch?v=ilnhvwsu9ea&amp;t=245s">build an antivirus in 5 min – fresh machine learning #7. a fun video to watch</a>

<a href="https://www.youtube.com/watch?v=zt-4zdtvr30">hunting for malware with machine learning</a>

<a href="https://www.youtube.com/watch?v=qvwktoa-f34">machine learning for threat detection</a>

<a href="https://www.youtube.com/watch?v=frklx97igiw">machine learning and the cloud: disrupting threat detection and prevention</a>

<a href="https://www.youtube.com/watch?v=ghtn4ju69w0">fraud detection using machine learning &amp; deep learning</a>

<a href="https://www.youtube.com/watch?v=b7okgc3ajvm">the applications of deep learning on traffic identification</a>

<a href="https://www.youtube.com/watch?v=_0crsf6ypb4">defending networks with incomplete information: a machine learning approach</a>

<a href="https://vimeo.com/112702666">machine learning &amp; data science</a>

<a href="http://clicksecurity.github.io/data_hacking/">click security data hacking project</a>

<a href="http://fsecurify.com/using-neural-networks-to-generate-human-readable-passwords/">using neural networks to generate human readable passwords</a>

<a href="http://fsecurify.com/machine-learning-based-password-strength-checking/">machine learning based password strength classification</a>

<a href="http://fsecurify.com/using-machine-learning-detect-malicious-urls/">using machine learning to detect malicious urls</a>

<a href="http://www.kdnuggets.com/2015/12/big-data-science-security-fraud-detection.html">big data and data science for security and fraud detection</a>

<a href="https://deepmlblog.wordpress.com/2016/01/03/how-to-break-a-captcha-system/">using deep learning to break a captcha system</a>

<a href="https://www.r-bloggers.com/data-mining-for-network-security-and-intrusion-detection/">data mining for network security and intrusion detection</a>

<a href="http://blog.sqrrl.com/an-introduction-to-machine-learning-for-cybersecurity-and-threat-hunting">an introduction to machine learning for cybersecurity and threat hunting</a>

<a href="http://news.mit.edu/2016/ai-system-predicts-85-percent-cyber-attacks-using-input-human-experts-0418">system predicts 85 percent of cyber-attacks using input from human experts</a>

<a href="http://www.mlsecproject.org/#open-source-projects">a list of open source projects in cyber security using machine learning</a>

<a href="http://redstagfulfillment.com/growth-of-artificial-intelligence-in-e-commerce/">the growth of artificial intelligence in e-commerce</a>

本文来自合作伙伴“阿里聚安全”,发表于2017年05月16日 14:03 .

继续阅读