Cybersecurity analytics. (2019)
- Record Type:
- Book
- Title:
- Cybersecurity analytics. (2019)
- Main Title:
- Cybersecurity analytics
- Further Information:
- Note: Rakesh M. Verma and David Marchette.
- Authors:
- Verma, Rakesh M
Marchette, David J - Contents:
- Preface Introduction What is Data Analytics? Data Ingestion Data Processing and Cleaning Visualization and Exploratory Analysis Scatterplots Pattern Recognition Classification Clustering Feature extraction Feature Selection Random Projections Modeling Model Specification Model Selection and Fitting Evaluation Strengths and Limitations The Curse of Dimensionality Security: Basics and Security Analytics Basics of Security Know Thy Enemy – Attackers and Their Motivations Security Goals Mechanisms for Ensuring Security Goals Confidentiality Integrity Availability Authentication Access Control Accountability Non-repudiation Threats, Attacks and Impacts Passwords Malware Spam, Phishing and its Variants Intrusions Internet Surfing System Maintenance and Firewalls Other Vulnerabilities Protecting Against Attacks Applications of Data Science to Security Challenges Cybersecurity Datasets Data Science Applications Passwords Malware Intrusions Spam/Phishing Credit Card Fraud/Financial Fraud Opinion Spam Denial of Service Security Analytics and Why Do We Need It Statistics Probability Density Estimation Models Poisson Uniform Normal Parameter Estimation The Bias-Variance Trade-Off The Law of Large Numbers and the Central Limit Theorem Confidence Intervals Hypothesis Testing Bayesian Statistics Regression Logistic Regression Regularization Principal Components Multidimensional Scaling Procrustes Nonparametric Statistics Time Series Data Mining – Unsupervised Learning Data Collection TypesPreface Introduction What is Data Analytics? Data Ingestion Data Processing and Cleaning Visualization and Exploratory Analysis Scatterplots Pattern Recognition Classification Clustering Feature extraction Feature Selection Random Projections Modeling Model Specification Model Selection and Fitting Evaluation Strengths and Limitations The Curse of Dimensionality Security: Basics and Security Analytics Basics of Security Know Thy Enemy – Attackers and Their Motivations Security Goals Mechanisms for Ensuring Security Goals Confidentiality Integrity Availability Authentication Access Control Accountability Non-repudiation Threats, Attacks and Impacts Passwords Malware Spam, Phishing and its Variants Intrusions Internet Surfing System Maintenance and Firewalls Other Vulnerabilities Protecting Against Attacks Applications of Data Science to Security Challenges Cybersecurity Datasets Data Science Applications Passwords Malware Intrusions Spam/Phishing Credit Card Fraud/Financial Fraud Opinion Spam Denial of Service Security Analytics and Why Do We Need It Statistics Probability Density Estimation Models Poisson Uniform Normal Parameter Estimation The Bias-Variance Trade-Off The Law of Large Numbers and the Central Limit Theorem Confidence Intervals Hypothesis Testing Bayesian Statistics Regression Logistic Regression Regularization Principal Components Multidimensional Scaling Procrustes Nonparametric Statistics Time Series Data Mining – Unsupervised Learning Data Collection Types of Data and Operations Properties of Datasets Data Exploration and Preprocessing Data Exploration Data Preprocessing/Wrangling Data Representation Association Rule Mining Variations on the Apriori Algorithm Clustering Partitional Clustering Choosing K Variations on K-means Algorithm Hierarchical Clustering Other Clustering Algorithms Measuring the Clustering Quality Clustering Miscellany: Clusterability, Robustness, Incremental, Manifold Discovery Spectral Embedding Anomaly Detection Statistical Methods Distance-based Outlier Detection kNN based approach Density-based Outlier Detection Clustering-based Outlier Detection One-class learning based Outliers Security Applications and Adaptations Data Mining for Intrusion Detection Malware Detection Stepping-stone Detection Malware Clustering Directed Anomaly Scoring for Spear Phishing Detection Concluding Remarks and Further Reading Machine Learning – Supervised Learning Fundamentals of Supervised Learning The Bayes Classifier Naïve Bayes Nearest Neighbors Classifiers Linear Classifiers Decision Trees and Random Forests Random Forest Support Vector Machines Semi-Supervised Classification Neural Networks and Deep Learning Perceptron Neural Networks Deep Networks Topological Data Analysis Ensemble Learning Majority Adaboost One-class Learning Online Learning Adversarial Machine Learning Adversarial Examples Adversarial Training Adversarial Generation Beyond Continuous Data Evaluation of Machine Learning Cost-sensitive Evaluation New Metrics for Unbalanced Datasets Security Applications and Adaptations Intrusion Detection Malware Detection Spam and Phishing Detection For Further Reading Text Mining Tokenization Preprocessing Bag-Of-Words Vector space model Weighting Latent Semantic Indexing Embedding Topic Models: Latent Dirichlet Allocation Sentiment Analysis Natural Language Processing Challenges of NLP Basics of Language Study and NLP Techniques Text Preprocessing Feature Engineering on Text Data Morphological, Word and Phrasal Features Clausal and Sentence Level Features Statistical Features Corpus-based Analysis Advanced NLP Tasks Part of Speech Tagging Word sense Disambiguation Language Modeling Topic Modeling Sequence to Sequence Tasks Knowledge Bases and Frameworks Natural Language Generation Issues with Pipelining Security Applications of NLP Password Checking Email Spam Detection Phishing Email Detection Malware Detection Attack Generation Big Data Techniques and Security Key terms Ingesting the Data Persistent Storage Computing and Analyzing Techniques for Handling Big Data Visualizing Streaming Data Big Data Security Implications of Big Data Characteristics on Security and Privacy Mechanisms for Big Data Security Goals Linear Algebra Basics Vectors Matrices Eigenvectors and Eigenvalues The Singular Value Decomposition Graphs Graph Invariants The Laplacian Probability Probability Conditional Probability and Bayes’ Rule Base Rate Fallacy Expected Values and Moments Distribution Functions and Densities Models Bernoulli and Binomial Multinomial Uniform Bibliography Author Index Index … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : Chapman & Hall/CRC
- Publication Date:
- 2019
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer security - Languages:
- English
- ISBNs:
- 9781000727890
9781000727654
9781000727777
9780429326813 - Related ISBNs:
- 9780367346010
- Notes:
- Note: Includes bibliographical references and indexes.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.476311
- Ingest File:
- 02_628.xml