Карточка | Таблица | RUSMARC | |
Halder, Soma. Hands-on machine learning for cybersecurity: safeguard your system by making your machines intelligent using the Python ecosystem / Soma Halder, Sinan Ozdemir. — 1 online resource (1 volume) : illustrations — <URL:http://elib.fa.ru/ebsco/1993339.pdf>.Дата создания записи: 31.01.2019 Тематика: Computer security.; Machine learning.; COMPUTERS / Security / General; Computer security.; Machine learning. Коллекции: EBSCO Разрешенные действия: –
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Группа: Анонимные пользователи Сеть: Интернет |
Права на использование объекта хранения
Место доступа | Группа пользователей | Действие | ||||
---|---|---|---|---|---|---|
Локальная сеть Финуниверситета | Все |
![]() ![]() ![]() |
||||
Интернет | Читатели |
![]() ![]() |
||||
![]() |
Интернет | Анонимные пользователи |
Оглавление
- Cover
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Table of Contents
- Preface
- Chapter 1: Basics of Machine Learning in Cybersecurity
- What is machine learning?
- Problems that machine learning solves
- Why use machine learning in cybersecurity?
- Current cybersecurity solutions
- Data in machine learning
- Structured versus unstructured data
- Labelled versus unlabelled data
- Machine learning phases
- Inconsistencies in data
- Overfitting
- Underfitting
- Different types of machine learning algorithm
- Supervised learning algorithms
- Unsupervised learning algorithms
- Reinforcement learning
- Another categorization of machine learning
- Classification problems
- Clustering problems
- Regression problems
- Dimensionality reduction problems
- Density estimation problems
- Deep learning
- Algorithms in machine learning
- Support vector machines
- Bayesian networks
- Decision trees
- Random forests
- Hierarchical algorithms
- Genetic algorithms
- Similarity algorithms
- ANNs
- The machine learning architecture
- Data ingestion
- Data store
- The model engine
- Data preparation
- Feature generation
- Training
- Testing
- Performance tuning
- Mean squared error
- Mean absolute error
- Precision, recall, and accuracy
- How can model performance be improved?
- Fetching the data to improve performance
- Switching machine learning algorithms
- Ensemble learning to improve performance
- Hands-on machine learning
- Python for machine learning
- Comparing Python 2.x with 3.x
- Python installation
- Python interactive development environment
- Jupyter Notebook installation
- Python packages
- NumPy
- SciPy
- Scikit-learn
- pandas
- Matplotlib
- Mongodb with Python
- Installing MongoDB
- PyMongo
- Setting up the development and testing environment
- Use case
- Data
- Code
- Summary
- What is machine learning?
- Chapter 2: Time Series Analysis and Ensemble Modeling
- What is a time series?
- Time series analysis
- Stationarity of a time series models
- Strictly stationary process
- Correlation in time series
- Autocorrelation
- Partial autocorrelation function
- Time series analysis
- Classes of time series models
- Stochastic time series model
- Artificial neural network time series model
- Support vector time series models
- Time series components
- Systematic models
- Non-systematic models
- Time series decomposition
- Level
- Trend
- Seasonality
- Noise
- Use cases for time series
- Signal processing
- Stock market predictions
- Weather forecasting
- Reconnaissance detection
- Time series analysis in cybersecurity
- Time series trends and seasonal spikes
- Detecting distributed denial of series with time series
- Dealing with the time element in time series
- Tackling the use case
- Importing packages
- Importing data in pandas
- Data cleansing and transformation
- Feature computation
- Predicting DDoS attacks
- ARMA
- ARIMA
- ARFIMA
- Ensemble learning methods
- Types of ensembling
- Averaging
- Majority vote
- Weighted average
- Types of ensemble algorithm
- Bagging
- Boosting
- Stacking
- Bayesian parameter averaging
- Bayesian model combination
- Bucket of models
- Cybersecurity with ensemble techniques
- Types of ensembling
- Voting ensemble method to detect cyber attacks
- Summary
- What is a time series?
- Chapter 3: Segregating Legitimate and Lousy URLs
- Introduction to the types of abnormalities in URLs
- URL blacklisting
- Drive-by download URLs
- Command and control URLs
- Phishing URLs
- URL blacklisting
- Using heuristics to detect malicious pages
- Data for the analysis
- Feature extraction
- Lexical features
- Web-content-based features
- Host-based features
- Site-popularity features
- Using machine learning to detect malicious URLs
- Logistic regression to detect malicious URLs
- Dataset
- Model
- TF-IDF
- SVM to detect malicious URLs
- Multiclass classification for URL classification
- One-versus-rest
- Summary
- Introduction to the types of abnormalities in URLs
- Chapter 4: Knocking Down CAPTCHAs
- Characteristics of CAPTCHA
- Using artificial intelligence to crack CAPTCHA
- Types of CAPTCHA
- reCAPTCHA
- No CAPTCHA reCAPTCHA
- Breaking a CAPTCHA
- Solving CAPTCHAs with a neural network
- Dataset
- Packages
- Theory of CNN
- Model
- Code
- Training the model
- Testing the model
- Summary
- Chapter 5: Using Data Science to Catch Email Fraud and Spam
- Email spoofing
- Bogus offers
- Requests for help
- Types of spam emails
- Deceptive emails
- CEO fraud
- Pharming
- Dropbox phishing
- Google Docs phishing
- Spam detection
- Types of mail servers
- Data collection from mail servers
- Using the Naive Bayes theorem to detect spam
- Laplace smoothing
- Featurization techniques that convert text-based emails into numeric values
- Log-space
- TF-IDF
- N-grams
- Tokenization
- Logistic regression spam filters
- Logistic regression
- Dataset
- Python
- Results
- Summary
- Email spoofing
- Chapter 6: Efficient Network Anomaly Detection Using k-means
- Stages of a network attack
- Phase 1 – Reconnaissance
- Phase 2 – Initial compromise
- Phase 3 – Command and control
- Phase 4 – Lateral movement
- Phase 5 – Target attainment
- Phase 6 – Ex-filtration, corruption, and disruption
- Dealing with lateral movement in networks
- Using Windows event logs to detect network anomalies
- Logon/Logoff events
- Account logon events
- Object access events
- Account management events
- Active directory events
- Ingesting active directory data
- Data parsing
- Modeling
- Detecting anomalies in a network with k-means
- Network intrusion data
- Coding the network intrusion attack
- Model evaluation
- Sum of squared errors
- Choosing k for k-means
- Normalizing features
- Manual verification
- Network intrusion data
- Summary
- Stages of a network attack
- Chapter 7: Decision Tree and Context-Based Malicious Event Detection
- Adware
- Bots
- Bugs
- Ransomware
- Rootkit
- Spyware
- Trojan horses
- Viruses
- Worms
- Malicious data injection within databases
- Malicious injections in wireless sensors
- Use case
- The dataset
- Importing packages
- Features of the data
- Model
- Decision tree
- Types of decision trees
- Categorical variable decision tree
- Continuous variable decision tree
- Gini coeffiecient
- Random forest
- Anomaly detection
- Isolation forest
- Supervised and outlier detection with Knowledge Discovery Databases (KDD)
- Revisiting malicious URL detection with decision trees
- Summary
- Chapter 8: Catching Impersonators and Hackers Red Handed
- Understanding impersonation
- Different types of impersonation fraud
- Impersonators gathering information
- How an impersonation attack is constructed
- Using data science to detect domains that are impersonations
- Levenshtein distance
- Finding domain similarity between malicious URLs
- Authorship attribution
- AA detection for tweets
- Difference between test and validation datasets
- Sklearn pipeline
- Naive Bayes classifier for multinomial models
- Identifying impersonation as a means of intrusion detection
- Summary
- Chapter 9: Changing the Game with TensorFlow
- Introduction to TensorFlow
- Installation of TensorFlow
- TensorFlow for Windows users
- Hello world in TensorFlow
- Importing the MNIST dataset
- Computation graphs
- What is a computation graph?
- Tensor processing unit
- Using TensorFlow for intrusion detection
- Summary
- Chapter 10: Financial Fraud and How Deep Learning Can Mitigate It
- Machine learning to detect financial fraud
- Imbalanced data
- Handling imbalanced datasets
- Random under-sampling
- Random oversampling
- Cluster-based oversampling
- Synthetic minority oversampling technique
- Modified synthetic minority oversampling technique
- Detecting credit card fraud
- Logistic regression
- Loading the dataset
- Approach
- Logistic regression classifier – under-sampled data
- Tuning hyperparameters
- Detailed classification reports
- Predictions on test sets and plotting a confusion matrix
- Logistic regression classifier – skewed data
- Investigating precision-recall curve and area
- Tuning hyperparameters
- Deep learning time
- Adam gradient optimizer
- Summary
- Machine learning to detect financial fraud
- Chapter 11: Case Studies
- Introduction to our password dataset
- Text feature extraction
- Feature extraction with scikit-learn
- Using the cosine similarity to quantify bad passwords
- Putting it all together
- Summary
- Introduction to our password dataset
- Other Books You May Enjoy
- Index
Статистика использования
|
Количество обращений: 1
За последние 30 дней: 0 Подробная статистика |