Data exfiltration threats and prevention techniques : machine learning and memory-based data security
by
Tari, Zahir, 1961- author.
Title
:
Data exfiltration threats and prevention techniques : machine learning and memory-based data security
Author
:
Tari, Zahir, 1961- author.
ISBN
:
9781119898894
9781119898887
9781119898900
Physical Description
:
1 online resource (xxiii, 260 pages) : illustrations
Contents
:
Acknowledgments ix -- Acronyms xi -- 1 Introduction 5 -- 1.1 Data Exfiltration Methods . . . . . . . . . . . . . . . . . . . . . 9 -- 1.2 Important Questions . . . . . . . . . . . . . . . . . . . . . . . . . 14 -- 1.3 Book Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 -- 1.4 Book Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 -- 1.5 Book Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 -- 2 Background 29 -- 2.1 Hidden Markov Model . . . . . . . . . . . . . . . . . . . . . . . . 29 -- 2.2 Memory Forensics . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 -- 2.3 Bag-of-Words Model . . . . . . . . . . . . . . . . . . . . . . . . . 42 -- 2.4 Sparse Distributed Representation . . . . . . . . . . . . . . . . . 43 -- 2.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 -- 3 Data Security Threats 47 -- 3.1 Data Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 -- 3.2 Security vs. Protection vs. Privacy . . . . . . . . . . . . . . . . . 53 -- 3.3 Advanced Persistent Threats Attacks . . . . . . . . . . . . . . . 54 -- v -- 3.4 Cybersecurity Threats . . . . . . . . . . . . . . . . . . . . . . . . 58 -- 3.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 -- 4 Use Cases Data Leakage Attacks 91 -- 4.1 Most Significant Attacks . . . . . . . . . . . . . . . . . . . . . . . 91 -- 4.2 Top Infection Vectors . . . . . . . . . . . . . . . . . . . . . . . . . 98 -- 4.3 Top Threats of Recent Years . . . . . . . . . . . . . . . . . . . . 101 -- 4.4 Malware Development Trends . . . . . . . . . . . . . . . . . . . . 103 -- 4.5 Geographic Trends . . . . . . . . . . . . . . . . . . . . . . . . . . 108 -- 4.6 Industry Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 -- 4.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 -- 5 Survey on Building Block Technologies 117 -- 5.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 -- 5.2 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 -- 5.3 Taxonomy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 -- 5.4 Supervised Learning Methods . . . . . . . . . . . . . . . . . . . . 140 -- 5.5 Systematic Literature Review . . . . . . . . . . . . . . . . . . . . 155 -- 5.6 Evaluation of Supervised Learning Methods . . . . . . . . . . . . 156 -- 5.7 Key Open Problems . . . . . . . . . . . . . . . . . . . . . . . . . 175 -- 5.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 -- 6 Behavior-based Data Exfiltration Detection 179 -- 6.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 -- 6.2 Existing Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 -- vi -- 6.3 Sub-Curve HMM Method . . . . . . . . . . . . . . . . . . . . . . 190 -- 6.4 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 -- 6.5 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . 214 -- 6.6 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 -- 6.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 -- 7 Memory-based Data Exfiltration Detection 229 -- 7.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 -- 7.2 Existing Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 -- 7.3 Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 -- 7.4 Fast lookup Bag-of-Words (FBoW) . . . . . . . . . . . . . . . . 244 -- 7.5 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 -- 7.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 -- 8 Temporal-based Data Exfiltration Detection 281 -- 8.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 -- 8.2 Existing Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 -- 8.3 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 -- 8.4 Temporary Memory Bag-of-Words (TMBoW) . . . . . . . . . . 293 -- 8.5 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . 301 -- 8.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 -- 9 Conclusion 317.
Abstract
:
"Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks, raising awareness of the increasing number of attacks each year. Provided with a detailed description of the recent advances in data exfiltration detection methods and technologies, the authors discuss details of data breach countermeasures and attack scenarios to show how the reader may identify a potential cyber attack in the real world. Aimed at professionals and students alike, this book highlights a range of machine learning methods that can be used to detect potential data theft, identifying research gaps and the potential to make change in the future as technology continues to grow. Comprised of eight chapters, this book presents a better understanding of the core issues related to the cyber-attacks as well as the recent methods"-- Provided by publisher.
Local Note
:
John Wiley and Sons
Subject Term
:
Computer security -- Computer programs.
Computer networks -- Security measures -- Computer programs.
Malware (Computer software) -- Identification -- Computer programs.
Malware (Computer software) -- Prevention -- Computer programs.
Information filtering systems.
Sécurité informatique -- Logiciels.
Réseaux d'ordinateurs -- Sécurité -- Mesures -- Logiciels.
Logiciels malveillants -- Identification -- Logiciels.
Systèmes de filtrage d'information.
Viruses & Malware.
Networking.
Security.
COMPUTERS.
Computer networks -- Security measures -- Computer programs
Computer security -- Computer programs
Information filtering systems
Genre
:
Electronic books.
Added Author
:
Sohrabi, Nasrin, 1982-
Samadi, Yasaman, 1993-
Suaboot, Jakapan, 1984-
Electronic Access
:
| Library | Material Type | Item Barcode | Shelf Number | [[missing key: search.ChildField.HOLDING]] | Status |
|---|
| Online Library | E-Book | 598245-1001 | TK5105.59 .T365 2023 | | Wiley E-Kitap Koleksiyonu |