Part 3 – Protecting against ML-Driven Attacks
Up to this point in the book, someone could potentially experience security issues that rely on traditional methods that are modified to meet the demands of the ML environment. However, some advanced hackers employ ML applications specifically designed to thwart security measures through a learning process. In other words, the application has no other purpose than to somehow break into a system and achieve a particular set of hacker goals.
This section includes the following chapters:
- Chapter 10, Considering the Ramifications of Deepfakes
- Chapter 11, Leveraging Machine Learning against Hacking