Machine Learning for Cyber Security
A curated list of amazingly awesome tools and resources related to the use of machine learning for cyber security.
Table of Contents
โ Datasets
- Samples of Security Related Dats
- DARPA Intrusion Detection Data Sets
- Stratosphere IPS Data Sets
- Open Data Sets
- Data Capture from National Security Agency
- The ADFA Intrusion Detection Data Sets
- NSL-KDD Data Sets
- Malicious URLs Data Sets
- Multi-Source Cyber-Security Events
- Malware Training Sets: A machine learning dataset for everyone
โ Papers
- Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
- Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
- Anomalous Payload-Based Network Intrusion Detection
- Malicious PDF detection using metadata and structural features
- Adversarial support vector machine learning
- Exploiting machine learning to subvert your spam filter
- CAMP โ Content Agnostic Malware Protection
- Notos โ Building a Dynamic Reputation System for DNS
- Kopis โ Detecting malware domains at the upper dns hierarchy
- Pleiades โ From Throw-away Traffic To Bots โ Detecting The Rise Of DGA-based Malware
- EXPOSURE โ Finding Malicious Domains Using Passive DNS Analysis
- Polonium โ Tera-Scale Graph Mining for Malware Detection
- Nazca โ Detecting Malware Distribution in Large-Scale Networks
- PAYL โ Anomalous Payload-based Network Intrusion Detection
- Anagram โ A Content Anomaly Detector Resistant to Mimicry Attacks
- Applications of Machine Learning in Cyber Security
- An Investigation of Byte N-Gram Features for Malware Classi๏ฌcation
โ Books
- Data Mining and Machine Learning in Cybersecurity
- Machine Learning and Data Mining for Computer Security
- Network Anomaly Detection: A Machine Learning Perspective
- Machine Learning for Hackers: Case Studies and Algorithms to Get You Started
โ Talks
- Using Machine Learning to Support Information Security
- Defending Networks with Incomplete Information
- Applying Machine Learning to Network Security Monitoring
- Measuring the IQ of your Threat Intelligence Feeds
- Data-Driven Threat Intelligence: Metrics On Indicator Dissemination And Sharing
- Applied Machine Learning for Data Exfil and Other Fun Topics
- Secure Because Math: A Deep-Dive on ML-Based Monitoring
- Machine Duping 101: Pwning Deep Learning Systems
- Delta Zero, KingPhish3r โ Weaponizing Data Science for Social Engineering
- Defeating Machine Learning What Your Security Vendor Is Not Telling You
- CrowdSource: Crowd Trained Machine Learning Model for Malware Capability Det
- Defeating Machine Learning: Systemic Deficiencies for Detecting Malware
- Packet Capture Village โ Theodora Titonis โ How Machine Learning Finds Malware
- Build an Antivirus in 5 Min โ Fresh Machine Learning #7. A fun video to watch
- Hunting for Malware with Machine Learning
- Machine Learning for Threat Detection
- Machine Learning and the Cloud: Disrupting Threat Detection and Prevention
- Fraud detection using machine learning & deep learning
- The Applications Of Deep Learning On Traffic Identification
- Defending Networks With Incomplete Information: A Machine Learning Approach
- Machine Learning & Data Science
โ Tutorials
- Click Security Data Hacking Project
- Using Neural Networks to generate human readable passwords
- Machine Learning based Password Strength Classification
- Using Machine Learning to Detect Malicious URLs
- Big Data and Data Science for Security and Fraud Detection
- Using deep learning to break a Captcha system
- Data mining for network security and intrusion detection
- An Introduction to Machine Learning for Cybersecurity and Threat Hunting
โ Courses
โ Miscellaneous
- System predicts 85 percent of cyber-attacks using input from human experts
- A list of open source projects in cyber security using machine learning
Please have a look at