This article is a how-to guide with code samples for security professionals and data scientists who wish to apply machine learning techniques for cyber-security needs. — Introduction Applicability of Machine Learning (ML) algorithms — in the industry, tutorials, and courses — is heavily biased towards building the ML models themselves. From our point of view, however, the data preprocessing step (i.e., …