作者: Mehedy Masud , Latifur Khan , Bhavani Thuraisingham
DOI:
关键词: Data management 、 Identification (information) 、 Semantic Web 、 Botnet 、 Insider threat 、 Data mining 、 Malware 、 Data stream mining 、 Computer science 、 Exploit
摘要: Although the use of data mining for security and malware detection is quickly on rise, most books subject provide high-level theoretical discussions to near exclusion practical aspects. Breaking mold, Data Mining Tools Malware Detection provides a step-by-step breakdown how develop tools detection. Integrating theory with techniques experimental results, it focuses applications email worms, malicious code, remote exploits, botnets. The authors describe systems they have designed developed: worm using mining, scalable multi-level feature extraction technique detect executables, detecting exploits flow-based identification botnet traffic by multiple log files. For each these tools, detail system architecture, algorithms, performance limitations. Discusses emerging applications, including adaptable detection, insider threat firewall policy analysis, real-time Includes four appendices that firm foundation in management, secure systems, semantic web Describes stream From algorithms this one few will be equally valuable those industry, government, academia. It help technologists decide which select specific managers learn determine whether or not proceed project, developers find innovative alternative designs range applications.