

Joshua Saxe is Chief Data Scientist at major security vendor, Sophos, where he leads a security data science research team.
Meer over de auteursMalware Data Science
Attack Detection and Attribution
Paperback Engels 2018 1e druk 9781593278595Samenvatting
Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you'll need to know how to think like a data scientist.
In 'Malware Data Science', security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualization, and shows you how to apply these methods to malware detection and analysis.
You'll learn how to:
- Analyze malware using static analysis
- Observe malware behavior using dynamic analysis
- Identify adversary groups through shared code analysis
- Catch 0-day vulnerabilities by building your own machine learning detector
- Measure malware detector accuracy
- Identify malware campaigns, trends, and relationships through data visualization
Whether you're a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, Malware Data Science will help you stay ahead of the curve.
Specificaties
Lezersrecensies
Over Hillary Sanders
Inhoudsopgave
Chapter 1: Basic Static Malware Analysis (NOW AVAILABLE!)
Chapter 2: Beyond Basic Static Analysis: x86 Disassembly (NOW AVAILABLE!)
Chapter 3: A Brief Introduction to Dynamic Analysis (NOW AVAILABLE!)
Chapter 4: Identifying Adversary Campaigns Through Malware Relationship Analysis (NOW AVAILABLE!)
Chapter 5: Identifying Adversary Groups Through Share Code Analysis (NOW AVAILABLE!)
Chapter 6: Catching 0-day by Building Your Own Machine Learning Malware Detector (NOW AVAILABLE!)
Chapter 7: Building a Machine Learning-Based Detector in Python
Chapter 8: Measuring Malware Detector Accuracy
Chapter 9: Identifying Malware Campaigns, Trends, and Relationships Through Visualization
Chapter 10: The Basics of Deep Learning
Chapter 11: Using keras to Implement a Neural Network
Chapter 12: Conclusion
Appendix A: Documentation of Tools Accompanying Book
Appendix B: Malware Dataset Descriptions
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan