Librería Portfolio Librería Portfolio

Búsqueda avanzada

TIENE EN SU CESTA DE LA COMPRA

0 productos

en total 0,00 €

BIG DATA ANALYTICS WITH APPLICATIONS IN INSIDER THREAT DETECTION
Título:
BIG DATA ANALYTICS WITH APPLICATIONS IN INSIDER THREAT DETECTION
Subtítulo:
Autor:
THURAISINGHAM, B
Editorial:
CRC PRESS
Año de edición:
2017
ISBN:
978-1-4987-0547-9
Páginas:
544
99,95 €

 

Sinopsis

Features

Outlines a technique whereby antivirus interfaces that reveal classification decisions can be exploited to infer confidential information about the underlying signature database. These classification decisions can be used as training inputs to data mining-based malware detectors
Details the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for threat detection
Summary

Today´s malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.



Table of Contents

Supporting Technologies. Introduction. Data Mining Techniques. Cyber Security and Malware. Data Mining for Malware Detection. Conclusion. Stream-Based Novel Class Detection. Stream Mining. Novel Class Detection Problem. SNOD. Conclusion. Reactively Adaptive Malware. Reactively Adaptive Malware. RAMAL Design. RAMAL Implementation. SNODMAL. Introduction. SNODMAL Design. SNODMAL Implementation. SNODMAL FOR RAMAL. SNODMAL Extensions. Introduction. SNODMAL on the Cloud. SNODCAL. SNODMAL++. Conclusion. Summary and Directions. References. Appendix A: Data Management Systems. Appendix B: Malware Products.