Advances in Malware and Data-Driven Network Security

Advances in Malware and Data-Driven Network Security

Author: Gupta, Brij B.

Publisher: IGI Global

Published: 2021-11-12

Total Pages: 304

ISBN-13: 1799877914

DOWNLOAD EBOOK

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware – to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, machine learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.


Big Data Analytics in Fog-Enabled IoT Networks

Big Data Analytics in Fog-Enabled IoT Networks

Author: Govind P. Gupta

Publisher: CRC Press

Published: 2023-04-19

Total Pages: 235

ISBN-13: 1000861864

DOWNLOAD EBOOK

The integration of fog computing with the resource-limited Internet of Things (IoT) network formulates the concept of the fog-enabled IoT system. Due to a large number of IoT devices, the IoT is a main source of Big Data. A large volume of sensing data is generated by IoT systems such as smart cities and smart-grid applications. A fundamental research issue is how to provide a fast and efficient data analytics solution for fog-enabled IoT systems. Big Data Analytics in Fog-Enabled IoT Networks: Towards a Privacy and Security Perspective focuses on Big Data analytics in a fog-enabled-IoT system and provides a comprehensive collection of chapters that touch on different issues related to healthcare systems, cyber-threat detection, malware detection, and the security and privacy of IoT Big Data and IoT networks. This book also emphasizes and facilitates a greater understanding of various security and privacy approaches using advanced artificial intelligence and Big Data technologies such as machine and deep learning, federated learning, blockchain, and edge computing, as well as the countermeasures to overcome the vulnerabilities of the fog-enabled IoT system.


Deep Learning Applications for Cyber Security

Deep Learning Applications for Cyber Security

Author: Mamoun Alazab

Publisher: Springer

Published: 2019-08-14

Total Pages: 260

ISBN-13: 3030130576

DOWNLOAD EBOOK

Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points.


Malware Data Science

Malware Data Science

Author: Joshua Saxe

Publisher: No Starch Press

Published: 2018-09-25

Total Pages: 274

ISBN-13: 1593278594

DOWNLOAD EBOOK

Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you'll need to know how to think like a data scientist. In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualization, and shows you how to apply these methods to malware detection and analysis. You'll learn how to: - Analyze malware using static analysis - Observe malware behavior using dynamic analysis - Identify adversary groups through shared code analysis - Catch 0-day vulnerabilities by building your own machine learning detector - Measure malware detector accuracy - Identify malware campaigns, trends, and relationships through data visualization Whether you're a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, Malware Data Science will help you stay ahead of the curve.


Advances in Cyber Security

Advances in Cyber Security

Author: Nibras Abdullah

Publisher: Springer Nature

Published: 2021-12-02

Total Pages: 611

ISBN-13: 9811680590

DOWNLOAD EBOOK

This book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.


Game Theory and Machine Learning for Cyber Security

Game Theory and Machine Learning for Cyber Security

Author: Charles A. Kamhoua

Publisher: John Wiley & Sons

Published: 2021-09-08

Total Pages: 546

ISBN-13: 1119723949

DOWNLOAD EBOOK

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. Readers will also enjoy: A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threats Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems In-depth examinations of generative models for cyber security Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security.


Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance

Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance

Author: Francia III, Guillermo A.

Publisher: IGI Global

Published: 2022-05-27

Total Pages: 309

ISBN-13: 1799883922

DOWNLOAD EBOOK

Recent decades have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As society becomes more heavily dependent on cyberspace, increasing levels of security measures will need to be established and maintained to protect the confidentiality, integrity, and availability of information. Global Perspectives on Information Security Regulations: Compliance, Controls, and Assurance summarizes current cybersecurity guidance and provides a compendium of innovative and state-of-the-art compliance and assurance practices and tools. It provides a synopsis of current cybersecurity guidance that organizations should consider so that management and their auditors can regularly evaluate their extent of compliance. Covering topics such as cybersecurity laws, deepfakes, and information protection, this premier reference source is an excellent resource for cybersecurity consultants and professionals, IT specialists, business leaders and managers, government officials, faculty and administration of both K-12 and higher education, libraries, students and educators of higher education, researchers, and academicians.


Handbook of Research on Cyber Law, Data Protection, and Privacy

Handbook of Research on Cyber Law, Data Protection, and Privacy

Author: Dewani, Nisha Dhanraj

Publisher: IGI Global

Published: 2022-04-22

Total Pages: 390

ISBN-13: 1799886433

DOWNLOAD EBOOK

The advancement of information and communication technology has led to a multi-dimensional impact in the areas of law, regulation, and governance. Many countries have declared data protection a fundamental right and established reforms of data protection law aimed at modernizing the global regulatory framework. Due to these advancements in policy, the legal domain has to face many challenges at a rapid pace making it essential to study and discuss policies and laws that regulate and monitor these activities and anticipate new laws that should be implemented in order to protect users. The Handbook of Research on Cyber Law, Data Protection, and Privacy focuses acutely on the complex relationships of technology and law both in terms of substantive legal responses to legal, social, and ethical issues arising in connection with growing public engagement with technology and the procedural impacts and transformative potential of technology on traditional and emerging forms of dispute resolution. Covering a range of topics such as artificial intelligence, data protection, and social media, this major reference work is ideal for government officials, policymakers, industry professionals, academicians, scholars, researchers, practitioners, instructors, and students.


Methods, Implementation, and Application of Cyber Security Intelligence and Analytics

Methods, Implementation, and Application of Cyber Security Intelligence and Analytics

Author: Om Prakash, Jena

Publisher: IGI Global

Published: 2022-06-17

Total Pages: 286

ISBN-13: 166843993X

DOWNLOAD EBOOK

Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can address cyber security challenges. Artificial intelligence has been recognized as an important technology that can be employed successfully in the cyber security sector. Due to this, further study on the potential uses of artificial intelligence is required. Methods, Implementation, and Application of Cyber Security Intelligence and Analytics discusses critical artificial intelligence technologies that are utilized in cyber security and considers various cyber security issues and their optimal solutions supported by artificial intelligence. Covering a range of topics such as malware, smart grid, data breachers, and machine learning, this major reference work is ideal for security analysts, cyber security specialists, data analysts, security professionals, computer scientists, government officials, researchers, scholars, academicians, practitioners, instructors, and students.


Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security

Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security

Author: Dawson, Maurice

Publisher: IGI Global

Published: 2022-02-04

Total Pages: 282

ISBN-13: 1799886956

DOWNLOAD EBOOK

Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.