![]() |
|
How we trained an ML model to detect DLL hijacking - Printable Version +- Geeks for your information (https://www.geeks.fyi) +-- Forum: Security (https://www.geeks.fyi/forumdisplay.php?fid=68) +--- Forum: Security Vendors (https://www.geeks.fyi/forumdisplay.php?fid=87) +---- Forum: Kaspersky (https://www.geeks.fyi/forumdisplay.php?fid=90) +----- Forum: Kaspersky Security Blog (https://www.geeks.fyi/forumdisplay.php?fid=142) +----- Thread: How we trained an ML model to detect DLL hijacking (/showthread.php?tid=21195) |
How we trained an ML model to detect DLL hijacking - harlan4096 - 06 October 25 Quote:DLL hijacking is a common technique in which attackers replace a library called by a legitimate process with a malicious one. It is used by both creators of mass-impact malware, like stealers and banking Trojans, and by APT and cybercrime groups behind targeted attacks. In recent years, the number of DLL hijacking attacks has grown significantly.Developing a machine-learning model to detect DLL hijacking RE: How we trained an ML model to detect DLL hijacking - harlan4096 - 06 October 25 Detecting DLL hijacking with machine learning: real-world cases |