Isolation Forest
Isolation Forest: Detecting Anomalies Through Isolation In vast datasets like security logs, system metrics, or financial transaction records, we often need to find the data that is ‘different’. D...
Isolation Forest: Detecting Anomalies Through Isolation In vast datasets like security logs, system metrics, or financial transaction records, we often need to find the data that is ‘different’. D...
AI는 컴퓨터가 사람과 같은 행동을 할 수 있는 기술을 의미한다. ML은 AI를 달성하기 위해 사용되는 방법 중에 하나이다. 통계학적 기법을 사용하며 명시적 프로그래밍 없이 데이터로부터 학습을 하여 어떠한 문제를 해결 하는 기술이다. Deep learning이란 ML의 기법중에 하나이고 deep neural n...
How to train Supervised Learning은 결과값(y)를 알고 있을 때 쓴다. To predict with continuous variable, 이것은 Regression과 관련이 있다 - Numerical. 하지만 단순히 무엇인가 주어졌을 때 yes or no로 category를 해야한다면 classficia...
What is the Diamond Model of Intrusion Analysis? In the cyber threat intelligence (CTI) industry, several approaches are used to analyze and track the characteristics of cyber intrusions. Among th...
Threat Modeling Practical Guide What is Threat Modeling? Threat modeling is the process of identifying potential security threats during the design phase of an application or system and proactive...
What is Security Information and Event Management (SIEM)? Security Information and Event Management (SIEM) is an integrated security monitoring platform that gathers and analyzes the vast amount o...
What is an Intrusion Detection System (IDS)? An Intrusion Detection System (IDS), as its name suggests, is a device that detects malicious activities or policy violations—in other words, intrusion...
MITRE ATT&CK Framework: Understanding Cyber Threats and Defense Strategies What is MITRE ATT&CK? MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally acc...
Server-Side Template Injection (SSTI) — Practical Attacks and Defenses Overview In recent web application security assessments, while classic vulnerabilities like XSS and SQLi are becoming somewh...
What is a WAF? A WAF (Web Application Firewall) is a security solution that operates at OSI Layer 7 (the Application Layer), specializing in detecting and blocking specific attacks against web appl...