The cybersecurity world is beginning to find practical ways to use machine learning (ML) for good and for bad, for offense and for defense and on both sides of the red/blue and safe/block cyber security divides. The first thing most of us think of when ML comes up in cybersecurity is blue teams using ML to detect malicious entities such as files, domain names or packets. But there are so many other possibilities we are beginning to see
With ML all of these can become features. Then a data model is built by analysis of multiple samples of both real and sandbox systems. In fact, we’ll explore one red teamer’s proof of concept for just such an attack. It’s easy to follow because it uses just a handful of features based on the list of active processes.