Summary
In this chapter, you have been introduced to a typical workflow of AI projects. We showed the variants when the AI models would be either trained from scratch or pre-trained and possibly fine-tuned. Furthermore, we explained the approach to turning an AI model into a product. We also explained in a cybersecurity scenario, where the application of AI methods looks different, especially because of feature extraction. Thereafter, we explained the tools and libraries for malware and network traffic analysis to help you extract features in your own application scenario.
In the next section, we’ll present a deep dive into a particular topic of cybersecurity where AI methods are used—malware and network intrusion detection and analysis.