没有合适的资源?快使用搜索试试~ 我知道了~
首页Hands-on Machine Learning for Cybersecurity
Publisher: Packt Publishing (December 11, 2018) Publication Date: December 11, 2018 Language: English ASIN: B07FNVYSN3 Sold by: Amazon Digital Services LLC
资源详情
资源评论
资源推荐


Table of Contents
Preface
1
Chapter 1: Basics of Machine Learning in Cyber Security
4
What is Machine Learning?
5
Problems that Machine Learning solves
5
Why use Machine Learning in Cyber Security?
6
Current day cyber security solutions
7
Data in Machine Learning
8
Structured v/s Unstructured Data
8
Labeled v/s Unlabeled Data
8
Machine Learning Phases
9
Inconsistencies in Data
10
Over fitting 11
Under-fitting 11
Different Types of Machine Learning Algorithms
12
Supervised Learning Algorithms
12
Unsupervised Learning Algorithms
14
Reinforcement Learning
15
Another Categorization of Machine Learning
16
Classification Problems
17
Clustering Problems
18
Regression Problems
19
Dimensionality Reduction Problems
20
Density Estimation Problems
21
Deep Learning
22
Algorithms in Machine Learning
22
Support Vector Machines
22
Bayesian Networks
23
Decision Trees
23
Random Forests
23
Hierarchical Algorithms
23
Genetic Algorithms
23
Similarity Algorithms
24
Artificial Neural Networks
24
The Machine Learning Architecture
24
Data Ingest
25
Data Store
26
The Model Engine
26
Data Preparation 26
Feature Generation 27
Training 27
Testing 27
Performance Tuning
27
Mean squared error (MSE) 27

Table of Contents
[ ii ]
Mean absolute error (MAE) 28
Precision, Recall, Accuracy 29
How can the model performance be improved ?
30
Data to Improve Performance 30
Switching Machine Learning Algorithms 30
Ensemble Learning to Improve Performance 31
Hands on Machine Learning
31
Python For Machine Learning
32
Comparing Python Versions 2.x v/s 3.x
32
Python installation
32
Python Interactive Development Environment(IDE)
33
Jupyter Notebook Installation 33
Python Packages
34
numPy 34
sciPy 35
scikit-learn 35
Pandas 36
matplotlib 36
Mongodb with Python
37
Installing MongoDB 37
PyMongo 38
Setting up the development and testing environment
38
Usecase 39
Data 39
Code 39
Summary
42
Chapter 2: Time Series Analysis and Ensemble Learning
43
What is time series?
43
What is time series analysis ?
44
Stationarity of a time series models
44
Strictly stationary process
45
Autocorrelation
46
Partial auto correlation function
47
Classes of time series models
48
Stochastic time series model
48
Artificial Neural Network time series model.
49
Support vector time series models
49
Time series components
49
Systemetic Models
49
Non-systemetic model
49
Time series decomposition
49
Usecases of time series
53
Stock market predictions
54
Weather forecasting
55
Reconnoissance detection
56
Time series analysis in cybersecurity
56
Detecting distributed denial of series with time series
57
Importing packages
59

Table of Contents
[ iii ]
Importing data in Pandas
60
Data cleansing and transaformation
60
Data analysis
61
Predicting DDOS attack
64
Ensemble learning methods
67
Cyber security with ensemble techniques
71
Summary
72
Chapter 3: Segregating legitimate and lousy URLs
73
What are lousy URLs?
73
URL blacklisting
75
Phishing URls
77
Using machine learning to detect malicious pages
78
Data for the analysis
78
Feature extraction
79
Lexical features
79
Web Content Based Features
82
Host based features
83
Site popularity features
84
Summary
85
Chapter 4: Knocking Down Captchas
86
Chapter 5: Using Data Science to Catch Email Frauds and Spams
87
Chapter 6: Efficient Network Anomaly Detection Using K Means
88
Chapter 7: Decision Tree and Context Based Malicious Event Detection
89
Chapter 8: Catching Impersonators and Hackers Red Handed
90
Chapter 9: Speeding Things Up with GPU
91
Chapter 10: Change the Game with TensorFlow
92
Chapter 11: Financial Frauds and How Deep Learning Can Mitigate
them
93
Index
94

Preface
Chapter 1, Basics of Machine Learning in Cyber Security
The key focus of the chapter is allow readers to get familiarized with machine learning,
how is it practiced and its need in Cyber Security domain. This chapter builds on using
machine learning instead of conventional rule based engines while allowing the readers to
tackle challenges in the cyber security domain. Further, this chapter allow readers to get
hands-on knowledge on python, MongoDB and various libraries for machine learning and
concepts related to supervised and unsupervised learning.
Chapter 2, Time series Analysis and Ensemble Modeling
The first phase of the threat lifecycle deals with Reconnaissance where malwares/APTS
passively engages the target by searching through public information, penetrating
confidential corporate documents and so on. Time series Analysis helps detect packets
exchanged at odd hours or identify spikes seen during holidays or odd hours in the
corporate network.Given a sequence numbers for time series dataset we can restructure the
data model to look like a supervised learning by using the values at previous point in time
to predict the value at next point. Time
Similarly Ensembles methods are techniques that give boost in accuracy on predictions
made by our model. Meta learning from the ensemble algorithm helps identify the
resources which are getting exploited to continue the reconnaissance activity.
In this chapter we will implement two examples on ensemble modeling and time series
forecasting each.
Chapter 3, Segregating Legitimate and Lousyc
In the threat kill chain the initial attack often starts with “URL Injection” in emails,
attachments etcetera. Detecting bad urls in the initial stages of the attack help security
professionals to combat them early on. Thus, Having learnt the base concepts of machine
learning this chapter will focus on building practical skills and will discuss examples of
machine learning Implementation on URLs, identifying the good, bad and the worst of
URLs through an intelligent machine learning based python driven example application.
Additionally, this chapter will provide hands-on knowledge to the concepts learnt in the
first chapter as well as testing the accuracy of result generated by our program.
Chapter 4, Knocking Down Captchas
剩余96页未读,继续阅读

















安全验证
文档复制为VIP权益,开通VIP直接复制

评论2