One Article Review

Accueil - L'article:
Source Trend.webp TrendLabs Security
Identifiant 349504
Date de publication 2017-03-30 10:12:23 (vue: 2017-03-30 10:12:23)
Titre Smart Whitelisting Using Locality Sensitive Hashing
Texte Locality Sensitive Hashing (LSH) is an algorithm known for enabling scalable, approximate nearest neighbor search of objects. LSH enables a precomputation of a hash that can be quickly compared with another hash to ascertain their similarity. A practical application of LSH would be to employ it to optimize data processing and analysis. An example is transportation company Uber, which implemented LSH in the infrastructure that handles much of its data to identify trips with overlapping routes and reduce inconsistencies in GPS data. Trend Micro has been actively researching and publishing reports in this field since 2009. In 2013, we open sourced an implementation of LSH suitable for security solutions: Trend Micro Locality Sensitive Hashing (TLSH). TLSH is an approach to LSH, a kind of fuzzy hashing that can be employed in machine learning extensions of whitelisting. TLSH can generate hash values which can then be analyzed for similarities. TLSH helps determine if the file is safe to be run on the system based on its similarity to known, legitimate files. Thousands of hashes of different versions of a single application, for instance, can be sorted through and streamlined for comparison and further analysis. Metadata, such as certificates, can then be utilized to confirm if the file is legitimate. Post from: Trendlabs Security Intelligence Blog - by Trend Micro Smart Whitelisting Using Locality Sensitive Hashing
Envoyé Oui
Condensat 2009 2013 actively algorithm analysis analyzed another application approach approximate ascertain based been blog can certificates company compared comparison confirm data determine different employ employed enables enabling example extensions field file files from: further fuzzy generate gps handles has hash hashes hashing helps identify implementation inconsistencies infrastructure instance intelligence its kind known learning legitimate locality lsh lshâ suitable machine metadata micro much nearest neighbor objects open optimize overlapping post practical precomputation processing publishing quickly reduce reports researching routes run safe scalable search security sensitive similarities similarity since single smart solutions: sorted sourced streamlined such system then thousands through tlsh transportation trend trendlabs trips uber using utilized values versions which whichâ implementedâ lsh whitelisting would â we
Tags
Stories Uber
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: