Cargando…

Big data analytics with applications in insider threat detection /

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Thuraisingham, Bhavani M. (Autor), Masud, Mehedy (Autor), Parveen, Pallabi (Autor), Khan, Latifur (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, [2018]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1021185720
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 180201s2018 flua ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d IDEBK  |d STF  |d NLE  |d MCW  |d TOH  |d YDX  |d OCLCA  |d CEF  |d OCLCF  |d KSU  |d U3W  |d OCLCQ  |d DEBBG  |d PHUST  |d G3B  |d S9I  |d TYFRS  |d UAB  |d K6U  |d OCLCO  |d OCLCQ  |d RDF  |d OCLCQ  |d AAA  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9781351645768 
020 |a 1351645765 
020 |a 1498705472 
020 |a 9781498705479 
020 |a 1498705480 
020 |a 9781498705486 
020 |a 1315119455 
020 |a 9781315119458 
020 |z 9781498705479 
020 |z 9781498705486 
020 |z 9781315119458 
029 1 |a GBVCP  |b 101493527X 
035 |a (OCoLC)1021185720 
037 |a CL0500000936  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Thuraisingham, Bhavani M.,  |e author. 
245 1 0 |a Big data analytics with applications in insider threat detection /  |c Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan. 
264 1 |a Boca Raton, FL :  |b CRC Press,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from title page (viewed February 1, 2018). 
505 0 |a Chapter 1 Introduction -- part PART I Supporting Technologies for BDMA and BDSP -- chapter Introduction to Part I -- chapter 2 Data Security and Privacy -- chapter 3 Data Mining Techniques -- chapter 4 Data Mining for Security Applications -- chapter 5 Cloud Computing and Semantic Web Technologies -- chapter 6 Data Mining and Insider Threat Detection -- chapter 7 Big Data Management and Analytics Technologies -- chapter Conclusion to Part I -- part PART II Stream Data Analytics -- chapter Introduction to Part II -- chapter 8 Challenges for Stream Data Classification -- chapter 9 Survey of Stream Data Classification -- chapter 10 A Multi-Partition, Multi-Chunk Ensemble for Classifying Concept-Drifting Data Streams -- chapter 11 Classification and Novel Class Detection in Concept-Drifting Data Streams -- chapter 12 Data Stream Classification with Limited Labeled Training Data -- chapter 13 Directions in Data Stream Classification -- chapter Conclusion to Part II -- part PART III Stream Data Analytics for Insider Threat Detection -- chapter Introduction to Part III -- chapter 14 Insider Threat Detection as a Stream Mining Problem -- chapter 15 Survey of Insider Threat and Stream Mining -- chapter 16 Ensemble-Based Insider Threat Detection -- chapter 17 Details of Learning Classes -- chapter 18 Experiments and Results for Nonsequence Data -- chapter 19 Insider Threat Detection for Sequence Data -- chapter 20 Experiments and Results for Sequence Data -- chapter 21 Scalability Using Big Data Technologies -- chapter 22 Stream Mining and Big Data for Insider Threat Detection -- chapter Conclusion to Part III -- part PART IV Experimental BDMA and BDSP Systems -- chapter Introduction to Part IV -- chapter 23 Cloud Query Processing System for Big Data Management -- chapter 24 Big Data Analytics for Multipurpose Social Media Applications -- chapter 25 Big Data Management and Cloud for Assured Information Sharing -- chapter 26 Big Data Management for Secure Information Integration -- chapter 27 Big Data Analytics for Malware Detection -- chapter 28 A Semantic Web-Based Inference Controller for Provenance Big Data -- part PART V Next Steps for BDMA and BDSP -- chapter Introduction to Part V -- chapter 29 Confidentiality, Privacy, and Trust for Big Data Systems -- chapter 30 Unified Framework for Secure Big Data Management and Analytics -- chapter 31 Big Data, Security, and the Internet of Things -- chapter 32 Big Data Analytics for Malware Detection in Smartphones -- chapter 33 Toward a Case Study in Healthcare for Big Data Analytics and Security -- chapter 34 Toward an Experimental Infrastructure and Education Program for BDMA and BDSP -- chapter 35 Directions for BDSP and BDMA -- chapter Conclusion to Part V -- chapter 36 Summary and Directions. 
520 |a Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Data processing. 
650 0 |a Malware (Computer software) 
650 0 |a Big data. 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Computer networks  |x Access control. 
650 6 |a Sécurité informatique  |x Informatique. 
650 6 |a Logiciels malveillants. 
650 6 |a Données volumineuses. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a Big data  |2 fast 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer networks  |x Access control  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
700 1 |a Masud, Mehedy,  |e author. 
700 1 |a Parveen, Pallabi,  |e author. 
700 1 |a Khan, Latifur,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781351645768/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34435205 
938 |a Taylor & Francis  |b TAFR  |n 9781315119458 
938 |a YBP Library Services  |b YANK  |n 15006253 
994 |a 92  |b IZTAP