Data Mining Tools for Malware Detection (Hardcover)
暫譯: 惡意軟體偵測的資料探勘工具 (精裝版)
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
- 出版商: Auerbach Publication
- 出版日期: 2011-12-07
- 售價: $2,980
- 貴賓價: 9.5 折 $2,831
- 語言: 英文
- 頁數: 450
- 裝訂: Hardcover
- ISBN: 1439854548
- ISBN-13: 9781439854549
-
相關分類:
Data-mining
立即出貨 (庫存=1)
買這商品的人也買了...
-
$990Interactive TV Standards: A Guide to MHP, OCAP, and JavaTV
-
$750$495 -
$590$466 -
$520$442 -
$480$408 -
$580$493 -
$1,520Internet and World Wide Web : How To Program, 5/e (IE-Paperback)
-
$550$435 -
$450$383 -
$580$458 -
$950$751 -
$1,575$1,496 -
$540$459 -
$580$452 -
$460$359 -
$1,130$961 -
$400$380 -
$480$408 -
$300$198 -
$450$383 -
$780$616 -
$480$408 -
$580$458 -
$780$616 -
$580$458
相關主題
商品描述
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.
The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.
- Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data mining
- Includes four appendices that provide a firm foundation in data management, secure systems, and the semantic web
- Describes the authors’ tools for stream data mining
From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.
商品描述(中文翻譯)
雖然數據挖掘在安全性和惡意軟體檢測方面的應用迅速增加,但大多數相關書籍僅提供高層次的理論討論,幾乎不涉及實務層面。打破這一模式的《Data Mining Tools for Malware Detection》提供了如何開發數據挖掘工具以檢測惡意軟體的逐步解析。該書將理論與實用技術及實驗結果相結合,專注於電子郵件蠕蟲、惡意代碼、遠程利用和僵屍網絡的惡意軟體檢測應用。
作者描述了他們設計和開發的系統:使用數據挖掘進行電子郵件蠕蟲檢測、可擴展的多層特徵提取技術以檢測惡意可執行文件、使用數據挖掘檢測遠程利用,以及通過挖掘多個日誌文件進行基於流量的僵屍網絡流量識別。對於這些工具,作者詳細說明了系統架構、算法、性能結果和限制。
- 討論了新興應用的數據挖掘,包括可適應的惡意軟體檢測、內部威脅檢測、防火牆政策分析和實時數據挖掘
- 包含四個附錄,為數據管理、安全系統和語義網提供堅實的基礎
- 描述了作者的流數據挖掘工具
從算法到實驗結果,這是少數幾本對於業界、政府和學術界同樣有價值的書籍之一。它將幫助技術專家決定為特定應用選擇哪些工具,管理者將學會如何判斷是否應該繼續進行數據挖掘項目,而開發者則會找到針對各種應用的創新替代設計。