Machine Learning for Security Analysts - Part 3: Malicious URL Predictor

Поделиться
HTML-код
  • Опубликовано: 12 сен 2024

Комментарии • 27

  • @kencarson666
    @kencarson666 Год назад

    thanks Netsec! this video was very informative and I hope to learn more from your channel.
    listening to Ken Carson's Teen X - EP right now

  • @ShravanKumar147
    @ShravanKumar147 3 года назад

    Well Explained Precision and Recall... Great tutorial overall

  • @moneerasaleh8080
    @moneerasaleh8080 4 года назад

    Thank you for your informative video, very useful!
    Subscribed 👌✔

  • @harshdeshpande684
    @harshdeshpande684 3 года назад

    Nice explanations 👍

  • @themorbidhero2987
    @themorbidhero2987 4 года назад

    Thank you for this!

  • @OthmanAlikhan
    @OthmanAlikhan 4 года назад

    Thanks for the video =)

  • @Utkarshkharb
    @Utkarshkharb 3 года назад

    Thanks!

  • @kulasekhar5768
    @kulasekhar5768 2 года назад

    May I know which protocol you used in this regarding computer network subject

  • @rudraprasanasahoo1611
    @rudraprasanasahoo1611 3 года назад

    Sir
    Thanks for the video..
    Actually I'm taking help form your video to make the project on Phishing attack detection from machine learning technique.
    My doubt is I'm unable to show the Phishing attack testing of the URL,,
    What to do and sir how to do,,
    Reply needed!!!

  • @bloom6874
    @bloom6874 Год назад

    Can I apply same tokenisation algorithm for malicious xss payloads?

    • @NetsecExplained
      @NetsecExplained  Год назад

      Yes you can! In fact, tokenization is a standard process in AI/ML tasks like this.

    • @bloom6874
      @bloom6874 Год назад

      @@NetsecExplained great thanks!

  • @mihiradelkar3513
    @mihiradelkar3513 4 года назад +1

    how to try a url with custom user input

    • @NetsecExplained
      @NetsecExplained  4 года назад

      Hi Mihir,
      This video covers domain names only. If you're looking for something a little more like a WAF then you'll need to perform anomaly detection on user input to identify malicious characteristics.

  • @jayyumbo404
    @jayyumbo404 3 года назад

    hello, is there any way to apply this machine learning model to a windows server?

    • @NetsecExplained
      @NetsecExplained  3 года назад

      Absolutely! The easiest way is to download and install Anaconda. It will come with Jupyter notebooks so you can clone this repo and work from there.

  • @proudboy_1330
    @proudboy_1330 3 года назад

    How can I get dataset for phishing and legitimate url with features

    • @NetsecExplained
      @NetsecExplained  3 года назад

      Hello, all datasets and workbooks are located in the GitHub linked in the description below the video.

  • @dexterslab3306
    @dexterslab3306 4 года назад

    How to deploy this model in a website or an android app ?

    • @NetsecExplained
      @NetsecExplained  3 года назад

      This model was created using Scikit-learn library in Python. As far as I know, you'll require the same library to execute on whatever application you're running.

  • @4upranit
    @4upranit 2 года назад

    Can this is done in R programming

    • @NetsecExplained
      @NetsecExplained  2 года назад

      It can be done in R. The algorithms are the same, I'm only demonstrating how this is done in Python.

  • @vigneshs6317
    @vigneshs6317 3 года назад

    Hello sir in task 4a I get error like "test_tfidf_X" is not defined so please help me I properly followed all steps

    • @NetsecExplained
      @NetsecExplained  3 года назад +1

      Sure. "test_tfidf_X" is created in Task 3 at timestamp 7:34. If you're getting that error that means the code block was not executed correctly and there were errors. The notebook will tell you the error that occurred on that code block.

    • @vigneshs6317
      @vigneshs6317 3 года назад

      @@NetsecExplained ok sir I check for it thank you

  • @deepanshusingh6627
    @deepanshusingh6627 4 года назад

    Hello Great RUclipsr ,
    I saw your impressive video.
    I searched on github , on trying to understand working of machine learning.Here it is what I learned :
    I saw and read that Random Classifier Algorithm is the best for Phishing Detection.
    A data-set is used from archive.ics.uci.edu/ml/datasets/phishing+websites website.
    This data-set is parsed in Random Forest Classifier Algorithm.
    What I found is, that other features are implemented (30 in number or total).
    My Query is, What is the connection between the Random Forest Classifier Algorithm and these 30 Features?
    Because based on my understanding if I ran the features python file, And get output I should still be able to get a right output.
    Please put light on this problem of mine.
    Best Regards,
    Deepanshu Singh.

  • @Utkarshkharb
    @Utkarshkharb 3 года назад

    Why does the class imbalance not matter here????