Recently, I am studying on intrusion detection with machine learning, hoping to use what I have learned this semester in Machine Learning course to solve some real life problems. The first topic is using Hidden Markov Models to detect abnormal input for parameters.Continue reading “Detection for Abnormal Params with HMM (with Code)”
When you given a set of commands from a log file such as
.bash_history or something similar, you can definitely judge if this set of commands reveals a evil attack to your computer system by reading it lines by lines if there is not too many commands. However, for those companies, there are such many log files waiting to analyze that it is not possible to audit manually.
As the second CVE ID I have owned, CVE-2018-10574 identifies an arbitrary code