Главная
Study mode:
on
1
Introduction
2
Patricks background
3
Chris Sanders
4
Evolution
5
Adaptation
6
Owl Moth
7
Exploit Kit Evolution
8
Machine Learning
9
Training Data
10
Decision Trees
11
Strings
12
Anaconda
13
Results
14
Exponential Decay
15
Question
Description:
Explore the evolution and adaptation of exploit kits through machine learning in this 26-minute conference talk from BSides Augusta 2016. Delve into Patrick Perry's background and insights on exploit kit evolution, drawing parallels with nature's adaptations like the owl moth. Learn about decision trees, training data, and the application of machine learning techniques to analyze exploit kit behaviors. Discover how strings and tools like Anaconda are utilized in this process. Examine the results, including exponential decay patterns, and engage with the subsequent question and answer session to deepen your understanding of this cutting-edge approach to cybersecurity.

Super Bad Exploit Kits Machine Learning

Add to list