Details

Intelligent Security Systems


Intelligent Security Systems

How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security
1. Aufl.

von: Leon Reznik

91,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 23.09.2021
ISBN/EAN: 9781119771562
Sprache: englisch
Anzahl Seiten: 368

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>INTELLIGENT SECURITY SYSTEMS</b> <p><b>Dramatically improve your cybersecurity using AI and machine learning</b> <p>In <i>Intelligent Security Systems,</i> distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device’s owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities. <p>This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. <p><i>Intelligent Security Systems</i> includes supplementary resources on an author-hosted website, such as classroom presentation slides, sample review, test and exam questions, and practice exercises to make the material contained practical and useful. The book also offers: <ul><li>A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools </li> <li>An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems </li> <li>Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design </li> <li>A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends </li></ul> <p>Perfect for undergraduate and graduate students in computer security, computer science and engineering, <i>Intelligent Security Systems</i> will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields.
<p>Acknowledgments ix</p> <p>Introduction xi</p> <p><b>1 Computer Security with Artificial Intelligence, Machine Learning, and Data Science Combination: What? How? Why? And Why Now and Together? 1</b></p> <p>1.1 The Current Security Landscape 1</p> <p>1.2 Computer Security Basic Concepts 7</p> <p>1.3 Sources of Security Threats 9</p> <p>1.4 Attacks Against IoT and Wireless Sensor Networks 13</p> <p>1.5 Introduction into Artificial Intelligence, Machine Learning, and Data Science 18</p> <p>1.6 Fuzzy Logic and Systems 31</p> <p>1.7 Machine Learning 35</p> <p>1.8 Artificial Neural Networks (ANN) 43</p> <p>1.9 Genetic Algorithms (GA) 50</p> <p>1.10 Hybrid Intelligent Systems 51</p> <p>Review Questions 52</p> <p>Exercises 53</p> <p>References 54</p> <p><b>2 Firewall Design and Implementation: How to Configure Knowledge for the First Line of Defense? 57</b></p> <p>2.1 Firewall Definition, History, and Functions: What Is It? And Where Does It Come From? 57</p> <p>2.2 Firewall Operational Models or How Do They Work? 65</p> <p>2.3 Basic Firewall Architectures or How Are They Built Up? 70</p> <p>2.4 Process of Firewall Design, Implementation, and Maintenance or What Is the Right Way to Put All Things Together? 75</p> <p>2.5 Firewall Policy Formalization with Rules or How Is the Knowledge Presented? 82</p> <p>2.6 Firewalls Evaluation and Current Developments or How Are They Getting More and More Intelligent? 96</p> <p>Review Questions 104</p> <p>Exercises 106</p> <p>References 107</p> <p><b>3 Intrusion Detection Systems: What Do They Do Beyond the First Line of Defense? 109</b></p> <p>3.1 Definition, Goals, and Primary Functions 109</p> <p>3.2 IDS from a Historical Perspective 113</p> <p>3.3 Typical IDS Architecture Topologies, Components, and Operational Ranges 116</p> <p>3.4 IDS Types: Classification Approaches 121</p> <p>3.5 IDS Performance Evaluation 131</p> <p>3.6 Artificial Intelligence and Machine Learning Techniques in IDS Design 136</p> <p>3.7 Intrusion Detection Challenges and Their Mitigation in IDS Design and Deployment 159</p> <p>3.8 Intrusion Detection Tools 163</p> <p>Review Questions 172</p> <p>Exercises 174</p> <p>References 175</p> <p><b>4 Malware and Vulnerabilities Detection and Protection: What Are We Looking for and How? 177</b></p> <p>4.1 Malware Definition, History, and Trends in Development 177</p> <p>4.2 Malware Classification 182</p> <p>4.3 Spam 214</p> <p>4.4 Software Vulnerabilities 216</p> <p>4.5 Principles of Malware Detection and Anti-malware Protection 219</p> <p>4.6 Malware Detection Algorithms 229</p> <p>4.7 Anti-malware Tools 237</p> <p>Review Questions 240</p> <p>Exercises 242</p> <p>References 243</p> <p><b>5 Hackers versus Normal Users: Who Is Our Enemy and How to Differentiate Them from Us? 247</b></p> <p>5.1 Hacker’s Activities and Protection Against 247</p> <p>5.2 Data Science Investigation of Ordinary Users’ Practice 273</p> <p>5.3 User’s Authentication 288</p> <p>5.4 User’s Anonymity, Attacks Against It, and Protection 301</p> <p>Review Questions 309</p> <p>Exercises 310</p> <p>References 311</p> <p><b>6 Adversarial Machine Learning: Who Is Machine Learning Working For? 315</b></p> <p>6.1 Adversarial Machine Learning Definition 315</p> <p>6.2 Adversarial Attack Taxonomy 316</p> <p>6.3 Defense Strategies 320</p> <p>6.4 Investigation of the Adversarial Attacks Influence on the Classifier Performance Use Case 322</p> <p>6.5 Generative Adversarial Networks 327</p> <p>Review Questions 333</p> <p>Exercises 334</p> <p>References 335</p> <p>Index 337</p>
<p><b>Leon Reznik, PhD,</b> is Professor in the Department of Computer Science at Rochester Institute of Technology, USA. He received his doctorate in Information and Measurement Systems in 1983 at the St. Petersburg State Polytechnic University. He has published four books and numerous book chapters, conference papers, and journal articles.</p>
<p><b>Dramatically improve your cybersecurity using AI and machine learning</b></p> <p>In <i>Intelligent Security Systems,</i> distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device’s owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities. <p>This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. <p><i>Intelligent Security Systems</i> includes supplementary resources on an author-hosted website, such as classroom presentation slides, sample review, test and exam questions, and practice exercises to make the material contained practical and useful. The book also offers: <ul><li>A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools </li> <li>An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems </li> <li>Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design </li> <li>A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends </li></ul> <p>Perfect for undergraduate and graduate students in computer security, computer science and engineering, <i>Intelligent Security Systems</i> will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields.

Diese Produkte könnten Sie auch interessieren:

MDX Solutions
MDX Solutions
von: George Spofford, Sivakumar Harinath, Christopher Webb, Dylan Hai Huang, Francesco Civardi
PDF ebook
53,99 €
Concept Data Analysis
Concept Data Analysis
von: Claudio Carpineto, Giovanni Romano
PDF ebook
107,99 €
Handbook of Virtual Humans
Handbook of Virtual Humans
von: Nadia Magnenat-Thalmann, Daniel Thalmann
PDF ebook
150,99 €