mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-25 22:20:43 +00:00
22 lines
1.4 KiB
Markdown
22 lines
1.4 KiB
Markdown
# Hybrid Malware Classifier Part 1
|
||
|
||
## A.I. HYBRID MALWARE CLASSIFIER
|
||
|
||
### INTERMEDIATE PYTHON SKILL, INTERMEDIATE MACHINE LEARNING SKILLS \(Part 1\)
|
||
|
||
In this series of notebook we are going to build an **hybrid malware classifier.**
|
||
|
||
For the **First part** we will focus on the scripting that involves dynamic analysis. Any steps of this series will come useful in order to detect malwares, and in this piece we will try to classify them based on their behaviour, utilizing the logs produced by running a program.
|
||
|
||
In the **Second Part** we will see how to manipulate the logs files in order to add robustness to our classifier and adjust the code to counter the more advanced methods of A.I. Malware Evasion.
|
||
|
||
In the **Third Part** we will create a Static Malware Classifier.
|
||
|
||
For the **Fourth Part** For the Fourth Part we will add some tactics to add robustness to our Static classifier and merge the latter with our Dynamic Classifier.
|
||
|
||
**PLEASE NOTE:** This Series strongly relies on building a dataset on your own, even if it’s not mandatory.
|
||
|
||
There are also many available datasets for Static and/ or Dynamic Malware analysis on several sites for this type of classification, like Ember, VirusShare, Sorel-20M, but i strongly encourage that you build one or your own.
|
||
|
||
Here’s the link to our [**colab notebook**](https://colab.research.google.com/drive/1nNZLMogXF-iq-_78IvGTd-c89_C82AB8#scrollTo=lUHLMl8Pusrn) enjoy and stay safe :\)
|
||
|