August 2019
Intermediate to advanced
342 pages
9h 35m
English
In this chapter, we addressed the different strategies of malware threats detection, making use of various AI algorithms.
We saw how malwares can trick the analyst, using advanced techniques such as polymorphism, forcing the adoption of algorithmic-based detection tools.
Therefore, we introduced the clustering and classification algorithms, up to the more advanced ones, which are based on HMMs and neural networks, in the form of CNNs, in order to deal with such advanced threats.
In the next chapter, we will deal with Network Anomalies Detection techniques that leverage Artificial Intelligence.
Read now
Unlock full access