Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
10 Machine Learning Blueprints You Should Know for Cybersecurity

You're reading from  10 Machine Learning Blueprints You Should Know for Cybersecurity

Product type Book
Published in May 2023
Publisher Packt
ISBN-13 9781804619476
Pages 330 pages
Edition 1st Edition
Languages
Author (1):
Rajvardhan Oak Rajvardhan Oak
Profile icon Rajvardhan Oak

Table of Contents (15) Chapters

Preface 1. Chapter 1: On Cybersecurity and Machine Learning 2. Chapter 2: Detecting Suspicious Activity 3. Chapter 3: Malware Detection Using Transformers and BERT 4. Chapter 4: Detecting Fake Reviews 5. Chapter 5: Detecting Deepfakes 6. Chapter 6: Detecting Machine-Generated Text 7. Chapter 7: Attributing Authorship and How to Evade It 8. Chapter 8: Detecting Fake News with Graph Neural Networks 9. Chapter 9: Attacking Models with Adversarial Machine Learning 10. Chapter 10: Protecting User Privacy with Differential Privacy 11. Chapter 11: Protecting User Privacy with Federated Machine Learning 12. Chapter 12: Breaking into the Sec-ML Industry 13. Index 14. Other Books You May Enjoy

Basics of malware

Before we learn about detecting malware, let us briefly understand what exactly malware is and how it works.

What is malware?

Malware is simply any malicious software. It will install itself on your device (such as a computer, tablet, or smartphone) and operate in the background, often without your knowledge. It is designed to quietly change files on your device, and thus steal or corrupt sensitive information. Malware is generally camouflaged and pretends to be an otherwise innocent application. For example, a browser extension that offers free emojis can actually be malware that is secretly reading your passwords and siphoning them off to a third party.

Devices can be infected by malware in multiple ways. Here are some of the popular vectors attackers exploit to deliver malware to a user device:

  • Leveraging the premise of “free” software, such as a cracked version of expensive software such as Adobe Photoshop
  • USB devices with the...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}