Data Mining Tools for Malware Detection
Presenting theoretical concepts, practical techniques, and experimental results, this book provides a step-by-step illustration of how data mining tools are developed for malware detection. Foscusing on email worms, malicious code, remote exploits, and botnets, the authors describe the step-by-step...
Uloženo v:
| Hlavní autoři: | , , |
|---|---|
| Médium: | E-kniha Kniha |
| Jazyk: | angličtina |
| Vydáno: |
Boca Raton
Auerbach Publications
2012
CRC Press Auerbach Publishers, Incorporated |
| Vydání: | 1 |
| Témata: | |
| ISBN: | 1439854548, 9781439854549, 9781439854556, 1439854556 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
Obsah:
- Front Cover -- Contents -- Preface -- Acknowledgments -- The Authors -- Copyright Permissions -- Chapter 1: Introduction -- Part I: Data Mining and Security -- Chapter 2: Data Mining Techniques -- Chapter 3: Malware -- Chapter 4: Data Mining for Security Applications -- Chapter 5: Design and Implementation of Data Mining Tools -- Conclusion to Part I -- Chapter 6: Email Worm Detection -- Part II: Data Mining for Email Worm Detection -- Chapter 7: Design of the Data Mining Tool -- Chapter 8: Evaluation and Results -- Conclusion to Part II -- Chapter 9: Malicious Executables -- Part III: Data Mining for Detecting Malicious Executables -- Chapter 10: Design of the Data Mining Tool -- Chapter 11: Evaluation and Results -- Conclusion to Part III -- Chapter 12: Detecting Remote Exploits -- Part IV: Data Mining for Detecting Remote Exploits -- Chapter 13: Design of the Data Mining Tool -- Chapter 14: Evaluation and Results -- Conclusion to Part IV -- Part V: Data Mining for Detecting Botnets -- Chapter 15: Detecting Botnets -- Chapter 16: Design of the Data Mining Tool -- Chapter 17: Evaluation and Results -- Conclusion to Part V -- Part VI: Stream Mining for Security Applications -- Chapter 18: Stream Mining -- Chapter 19: Design of the Data Mining Tool -- Chapter 20: Evaluation and Results -- Conclusion for Part VI -- Part VII: Emerging Applications -- Chapter 21: Data Mining for Active Defense -- Chapter 22: Data Mining for Insider Threat Detection -- Chapter 23: Dependable Real-Time Data Mining -- Chapter 24: Firewall Policy Analysis -- Conclusion to Part VII -- Chapter 25: Summary and Directions -- Appendix A: Data Management Systems : Developments and Trends -- Appendix B: Trustworthy Systems -- Appendix C: Secure Data, Information, and Knowledge Management -- Appendix D: Semantic Web -- Back Cover

