Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Treehouse

(UPI) Chapter 18: Machine Learning in Cybersecurity Course (How To)

via Treehouse

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it

About this Course

In this chapter, machine learning techniques are applied to the cybersecurity domain with a focus on ransomware detection and classification, where a multi-tiered streaming analytics model leverages 24 static and dynamic traits to distinguish between various ransomware families and versions. Experimental evaluations demonstrate that the proposed hybrid machine learner outperforms state-of-the-art methods in accuracy, speed, and resource efficiency, addressing critical challenges such as family attribution, multi-descent fusion, and imbalanced datasets.

Syllabus

Machine Learning in Cybersecurity

In this stage, the chapter introduces the use of machine learning for ransomware analysis by outlining the evolution of ransomware families, the "recipe-to-success" attack strategy, and the need for robust detection models that can adapt to rapidly evolving threats.

Chevron 4 steps
  • instruction

    18.2. Ransomware Versions and Ransomware Families

  • Quiz 18.2

    5 questions

  • instruction

    18.3. The State-of-The-Art of Anti-Ransomware Technology

  • Quiz 18.3

    5 questions

18.4. Experiments and Results

In this stage, the chapter presents a comprehensive evaluation of the proposed ransomware streaming analytics model and hybrid machine learner (HML) using both controlled comparative experiments and a month-long realistic test. These experiments demonstrate that the proposed solution outperforms state-of-the-art machine learners and anti-ransomware tools in detecting and classifying diverse and evolving ransomware threats, achieving high accuracy, efficient throughput, and robust performance on imbalanced real-world data.

Chevron 8 steps
  • instruction

    18.4. Experiments and Results

  • instruction

    18.4.1. Runtime Test Routine

  • instruction

    18.4.2. Data Collection and Evaluation Metrics

  • instruction

    18.4.3. Comparative Experiment

  • instruction

    18.4.4. Realistic Experiment

  • Quiz 18.4

    5 questions

  • instruction

    18.5. Discussion

  • Quiz 18.5

    5 questions

Reviews

Start your review of (UPI) Chapter 18: Machine Learning in Cybersecurity Course (How To)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.