December 2018
Intermediate to advanced
318 pages
8h 28m
English
In this chapter, we looked at understanding different types of impersonation and how the impersonators gather information. We learned about how the impersonation attack is constructed and how data science helps to detect domains that are impersonating someone. This chapter explained Levenshtein distance, along with finding domain similarity between malicious URLs and authorship attribution.
In the next chapter, we will look at changing the game with TensorFlow.
Read now
Unlock full access