• Complain

Tony Thomas - Machine Learning Approaches in Cyber Security Analytics

Here you can read online Tony Thomas - Machine Learning Approaches in Cyber Security Analytics full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: Springer, genre: Children. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Tony Thomas Machine Learning Approaches in Cyber Security Analytics

Machine Learning Approaches in Cyber Security Analytics: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Machine Learning Approaches in Cyber Security Analytics" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks.

Tony Thomas: author's other books


Who wrote Machine Learning Approaches in Cyber Security Analytics? Find out the surname, the name of the author of the book and a list of all author's works by series.

Machine Learning Approaches in Cyber Security Analytics — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Machine Learning Approaches in Cyber Security Analytics" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Tony Thomas Athira P Vijayaraghavan and Sabu Emmanuel Machine Learning - photo 1
Tony Thomas , Athira P. Vijayaraghavan and Sabu Emmanuel
Machine Learning Approaches in Cyber Security Analytics
Tony Thomas Indian Institute of Information Technology and Management-Kerala - photo 2
Tony Thomas
Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, Kerala, India
Athira P. Vijayaraghavan
Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, Kerala, India
Sabu Emmanuel
Kuwait University, Kuwait City, Kuwait
ISBN 978-981-15-1705-1 e-ISBN 978-981-15-1706-8
https://doi.org/10.1007/978-981-15-1706-8
Springer Nature Singapore Pte Ltd. 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.

The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Preface
About the Book

With an overwhelming amount of data being generated and transferred over various networks, cybersecurity experts are having a hard time in monitoring everything that gets exchanged and identifying potential cyberthreats and attacks. As cyberattacks are becoming more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify cyberattacks at a faster rate. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyberattacks. This book introduces various machine learning methods for cybersecurity analytics.

The main emphasis will be on the discussion of machine learning algorithms which have potential applications in cybersecurity analytics. There will be discussions on how cybersecurity analytics complements machine learning research. The potential applications include malware detection, biometrics, anomaly detection, cyberattack prediction, and so on.

The proposed book is a research monograph on cybersecurity analytics using various machine intelligence approaches. Most of the contents of the book are out of the original research by the authors. The cybersecurity and machine learning researchers, graduate students, and developers in cybersecurity will be benefited from this book. The prerequisites needed to understand the book are undergraduate-level knowledge mathematics, statistics, and computer science.

Aim and Scope

Nowadays, machine learning techniques have been applied in many areas such as voice recognition, fraud detection, email spam filtering, text processing, search recommendations, and video analysis. Machine learning techniques offer greater data analytics, reduction in the cost of computation, etc. Progress in the varied applications of machine learning techniques has also led to the advancement of the state of the art of machine learning research. In a broad sense, machine learning refers to a series of techniques where a machine is trained to solve a problem. Once a machine is trained, it can give solutions for several instances of the same problem.

Cybersecurity is a fast-growing field demanding a great deal of attention because of remarkable progresses in IoT networks, cloud and Web technologies, online banking, mobile environment, smart grid, etc. So with all of the recent technologies embracing machine learning approaches, one may ask what exactly is machine learning and how it is applied in cybersecurity analytics.

As cyberattacks are becoming more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify cyberattacks at a faster rate. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyberattacks. Diverse machine learning methods have been successfully deployed to address several wide-ranging problems in cybersecurity. This book discusses and highlights different applications of machine learning in cybersecurity. This research monograph presents the latest research in cybersecurity analytics using machine intelligence methods. A major part of the contents of the book are out of the research work carried out by the authors. This book will be useful for cybersecurity and machine learning researchers, graduate students and security product developers.

Acknowledgements

We thank our family, friends and colleagues for their support in helping to make this monograph possible. We thank the Government of Kerala for supporting this project through the Kerala State Planning Board project CRICTR.

Tony Thomas
Athira P. Vijayaraghavan
Sabu Emmanuel
Thiruvananthapuram, India
February 2019
Contents
About the Authors
Tony Thomas

is an Associate Professor at the Indian Institute of Information Technology and Management, Kerala, India. He received his masters and Ph.D. degrees from IIT Kanpur. After completing his Ph.D., he pursued postdoctoral research at the Korea Advanced Institute of Science and Technology, Daejeon, South Korea. He later worked as a member of research staff at the General Motors Research Lab, Bangalore, India, and the School of Computer Engineering, Nanyang Technological University, Singapore. His current research interests include malware analysis, biometrics, cryptography, machine learning, cyber threat prediction and visualization, digital watermarking, multimedia security and digital forensics.

Athira P. Vijayaraghavan

holds an M.Tech. degree in Information Security and Cyber Forensics from SRM Institute of Science and Technology (formerly known as SRM University), Chennai, India, and a B.Tech. degree in Information Technology from Calicut University, Kerala, India. She currently works at Acalvio Technologies, Bengaluru, Karnataka, as a member of technical staff. She worked as a Research Associate at the Indian Institute of Information Technology and Management, Kerala, India, till August 2019. Her current research interests include autonomous deception for malware detection, threat intelligence analysis, malware analysis, memory forensics and cyber threat prediction.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Machine Learning Approaches in Cyber Security Analytics»

Look at similar books to Machine Learning Approaches in Cyber Security Analytics. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Machine Learning Approaches in Cyber Security Analytics»

Discussion, reviews of the book Machine Learning Approaches in Cyber Security Analytics and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.