
Başlık:
Data exfiltration threats and prevention techniques : machine learning and memory-based data security
Yazar:
Tari, Zahir, 1961- author.
ISBN:
9781119898894
9781119898887
9781119898900
Fiziksel Tanımlama:
1 online resource (xxiii, 260 pages) : illustrations
İçerik:
Acknowledgments ix -- Acronyms xi -- 1 Introduction 5 -- 1.1 Data Exfiltration Methods . . . . . . . . . . . . . . . . . . . . . 9 -- 1.2 Important Questions . . . . . . . . . . . . . . . . . . . . . . . . . 14 -- 1.3 Book Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 -- 1.4 Book Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 -- 1.5 Book Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 -- 2 Background 29 -- 2.1 Hidden Markov Model . . . . . . . . . . . . . . . . . . . . . . . . 29 -- 2.2 Memory Forensics . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 -- 2.3 Bag-of-Words Model . . . . . . . . . . . . . . . . . . . . . . . . . 42 -- 2.4 Sparse Distributed Representation . . . . . . . . . . . . . . . . . 43 -- 2.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 -- 3 Data Security Threats 47 -- 3.1 Data Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 -- 3.2 Security vs. Protection vs. Privacy . . . . . . . . . . . . . . . . . 53 -- 3.3 Advanced Persistent Threats Attacks . . . . . . . . . . . . . . . 54 -- v -- 3.4 Cybersecurity Threats . . . . . . . . . . . . . . . . . . . . . . . . 58 -- 3.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 -- 4 Use Cases Data Leakage Attacks 91 -- 4.1 Most Significant Attacks . . . . . . . . . . . . . . . . . . . . . . . 91 -- 4.2 Top Infection Vectors . . . . . . . . . . . . . . . . . . . . . . . . . 98 -- 4.3 Top Threats of Recent Years . . . . . . . . . . . . . . . . . . . . 101 -- 4.4 Malware Development Trends . . . . . . . . . . . . . . . . . . . . 103 -- 4.5 Geographic Trends . . . . . . . . . . . . . . . . . . . . . . . . . . 108 -- 4.6 Industry Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 -- 4.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 -- 5 Survey on Building Block Technologies 117 -- 5.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 -- 5.2 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 -- 5.3 Taxonomy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 -- 5.4 Supervised Learning Methods . . . . . . . . . . . . . . . . . . . . 140 -- 5.5 Systematic Literature Review . . . . . . . . . . . . . . . . . . . . 155 -- 5.6 Evaluation of Supervised Learning Methods . . . . . . . . . . . . 156 -- 5.7 Key Open Problems . . . . . . . . . . . . . . . . . . . . . . . . . 175 -- 5.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 -- 6 Behavior-based Data Exfiltration Detection 179 -- 6.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 -- 6.2 Existing Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 -- vi -- 6.3 Sub-Curve HMM Method . . . . . . . . . . . . . . . . . . . . . . 190 -- 6.4 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 -- 6.5 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . 214 -- 6.6 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 -- 6.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 -- 7 Memory-based Data Exfiltration Detection 229 -- 7.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 -- 7.2 Existing Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 -- 7.3 Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 -- 7.4 Fast lookup Bag-of-Words (FBoW) . . . . . . . . . . . . . . . . 244 -- 7.5 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 -- 7.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 -- 8 Temporal-based Data Exfiltration Detection 281 -- 8.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 -- 8.2 Existing Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 -- 8.3 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 -- 8.4 Temporary Memory Bag-of-Words (TMBoW) . . . . . . . . . . 293 -- 8.5 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . 301 -- 8.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 -- 9 Conclusion 317.
Özet:
"Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks, raising awareness of the increasing number of attacks each year. Provided with a detailed description of the recent advances in data exfiltration detection methods and technologies, the authors discuss details of data breach countermeasures and attack scenarios to show how the reader may identify a potential cyber attack in the real world. Aimed at professionals and students alike, this book highlights a range of machine learning methods that can be used to detect potential data theft, identifying research gaps and the potential to make change in the future as technology continues to grow. Comprised of eight chapters, this book presents a better understanding of the core issues related to the cyber-attacks as well as the recent methods"-- Provided by publisher.
Notlar:
John Wiley and Sons
Konu Terimleri:
Tür:
Elektronik Erişim:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900Kopya:
Rafta:*
Kütüphane | Materyal Türü | Demirbaş Numarası | Yer Numarası | Durumu/İade Tarihi | Materyal Ayırtma |
|---|---|---|---|---|---|
Arıyor... | E-Kitap | 598245-1001 | TK5105.59 .T365 2023 | Arıyor... | Arıyor... |
