Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense
Marin, Ericsson, Almukaynizi, Mohammed, Sarkar, Soumajyoti
買這商品的人也買了...
-
$900Defensive Security Handbook: Best Practices for Securing Infrastructure
-
$166$158 -
$1,650$1,617 -
$2,050$1,948 -
$207算法設計指南, 2/e (The Algorithm Design Manual, 2/e)
相關主題
商品描述
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security paradigm of 'proactive cyber threat intelligence' that allows defenders of computer networks to gain a better understanding of their adversaries by analyzing assets, capabilities, and interest of malicious hackers. The authors propose models, techniques, and frameworks based on threat intelligence mined from the heart of the underground cyber world: the malicious hacker communities. They provide insights into the hackers themselves and the groups they form dynamically in the act of exchanging ideas and techniques, buying or selling malware, and exploits. The book covers both methodology - a hybridization of machine learning, artificial intelligence, and social network analysis methods - and the resulting conclusions, detailing how a deep understanding of malicious hacker communities can be the key to designing better attack prediction systems.
商品描述(中文翻譯)
惡意駭客利用全球資訊網來分享知識。分析這些威脅行為者的線上溝通可以幫助降低攻擊風險。本書將注意力從防禦者環境轉移到攻擊者環境,提供了一種新的安全範式,即「主動的網絡威脅情報」,使計算機網絡的防禦者能夠通過分析惡意駭客的資產、能力和興趣來更好地了解對手。作者提出了基於從地下網絡世界中挖掘的威脅情報的模型、技術和框架:惡意駭客社群。他們提供了關於駭客本身以及他們在交換想法和技術、買賣惡意軟體和攻擊手法時動態形成的群體的見解。本書涵蓋了方法論 - 機器學習、人工智慧和社交網絡分析方法的混合 - 以及由此得出的結論,詳細說明了對惡意駭客社群的深入了解如何成為設計更好的攻擊預測系統的關鍵。