Data exfiltration threats and prevention techniques machine learning and memory-based data security. (2023)
- Record Type:
- Book
- Title:
- Data exfiltration threats and prevention techniques machine learning and memory-based data security. (2023)
- Main Title:
- Data exfiltration threats and prevention techniques machine learning and memory-based data security
- Further Information:
- Note: Zahir Tari, Nasrin Sohrabi, Yasaman Samadi, Jakapan Suaboot.
- Authors:
- Tari, Zahir, 1961-
Sohrabi, Nasrin, 1982-
Samadi, Yasaman, 1993-
Suaboot, Jakapan, 1984- - Contents:
- About the Authors xv Acknowledgments xvii Acronyms xix Abstract xxi 1 Introduction 1 1.1 Data Exfiltration Methods 3 1.2 Important Questions 7 1.3 Book Scope 9 1.4 Book Summary 11 1.5 Book Structure 15 2 Background19 2.1 Hidden Markov Model 19 2.2 Memory Forensics 24 2.3 Bag-of-Words Model 27 2.4 Sparse Distributed Representation 28 2.5 Summary 29 3 Data Security Threats 31 3.1 Data Security 32 3.2 Security vs. Protection vs. Privacy 35 3.3 Advanced Persistent Threats Attacks 36 3.4 Cybersecurity Threats 38 3.5 Conclusion 59 4 Use Cases Data Leakage Attacks 63 4.1 Most Significant Attacks 63 4.2 Top Infection Vectors 68 4.3 Top Threats of Recent Years 70 4.4 Malware Development Trends 71 4.5 Geographic Trends 75 4.6 Industry Trends 78 4.7 Conclusion 80 5 Survey on Building Block Technologies 83 5.1 Motivation 83 5.2 Background 87 5.3 Taxonomy 96 5.4 Supervised Learning Methods 98 5.5 Systematic Literature Review 107 5.6 Evaluation of Supervised Learning Methods 108 5.7 Key Open Problems 125 5.8 Summary 127 6 Behavior-Based Data Exfiltration Detection Methods 141 6.1 Motivation 141 6.2 Existing Methods 144 6.3 Sub-Curve HMM Method 148 6.4 Evaluation 159 6.5 Experimental Results 164 6.6 Discussion 172 6.7 Summary 173 7 Memory-Based Data Exfiltration Detection Methods 181 7.1 Motivation 181 7.2 Existing Methods 183 7.3 Concepts 186 7.4 Fast Lookup Bag-of-Words (FBoW) 191 7.5 Evaluation 199 7.6 Summary 215 8 Temporal-Based Data Exfiltration Detection Methods 221 8.1 MotivationAbout the Authors xv Acknowledgments xvii Acronyms xix Abstract xxi 1 Introduction 1 1.1 Data Exfiltration Methods 3 1.2 Important Questions 7 1.3 Book Scope 9 1.4 Book Summary 11 1.5 Book Structure 15 2 Background19 2.1 Hidden Markov Model 19 2.2 Memory Forensics 24 2.3 Bag-of-Words Model 27 2.4 Sparse Distributed Representation 28 2.5 Summary 29 3 Data Security Threats 31 3.1 Data Security 32 3.2 Security vs. Protection vs. Privacy 35 3.3 Advanced Persistent Threats Attacks 36 3.4 Cybersecurity Threats 38 3.5 Conclusion 59 4 Use Cases Data Leakage Attacks 63 4.1 Most Significant Attacks 63 4.2 Top Infection Vectors 68 4.3 Top Threats of Recent Years 70 4.4 Malware Development Trends 71 4.5 Geographic Trends 75 4.6 Industry Trends 78 4.7 Conclusion 80 5 Survey on Building Block Technologies 83 5.1 Motivation 83 5.2 Background 87 5.3 Taxonomy 96 5.4 Supervised Learning Methods 98 5.5 Systematic Literature Review 107 5.6 Evaluation of Supervised Learning Methods 108 5.7 Key Open Problems 125 5.8 Summary 127 6 Behavior-Based Data Exfiltration Detection Methods 141 6.1 Motivation 141 6.2 Existing Methods 144 6.3 Sub-Curve HMM Method 148 6.4 Evaluation 159 6.5 Experimental Results 164 6.6 Discussion 172 6.7 Summary 173 7 Memory-Based Data Exfiltration Detection Methods 181 7.1 Motivation 181 7.2 Existing Methods 183 7.3 Concepts 186 7.4 Fast Lookup Bag-of-Words (FBoW) 191 7.5 Evaluation 199 7.6 Summary 215 8 Temporal-Based Data Exfiltration Detection Methods 221 8.1 Motivation 221 8.2 Existing Methods 223 8.3 Definitions 225 8.4 Temporary Memory Bag-of-Words (TMBoW) 229 8.5 Experimental Results 234 8.6 Summary 245 9 Conclusion 249 9.1 Summary 249 9.2 What Is Innovative in the Described Methods? 251 9.3 What Is Next? 253 Index 255 … (more)
- Edition:
- 1st
- Publisher Details:
- Hoboken : Wiley-IEEE Press
- Publication Date:
- 2023
- Extent:
- 1 online resource (288 pages)
- Subjects:
- 005.88
Computer security -- Computer programs
Computer networks -- Security measures -- Computer programs
Malware (Computer software) -- Identification -- Computer programs
Malware (Computer software) -- Prevention -- Computer programs
Information filtering systems - Languages:
- English
- ISBNs:
- 9781119898894
- Related ISBNs:
- 9781119898870
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.826364
- Ingest File:
- 21_058.xml