• Complain

Kim-Kwang Raymond Choo (editor) - Handbook of Big Data Analytics and Forensics

Here you can read online Kim-Kwang Raymond Choo (editor) - Handbook of Big Data Analytics and Forensics full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Kim-Kwang Raymond Choo (editor) Handbook of Big Data Analytics and Forensics

Handbook of Big Data Analytics and Forensics: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Handbook of Big Data Analytics and Forensics" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). The authors propose a deep learning-based approach to process clouds log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter.

The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICSs cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPSs cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated.

This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters.

This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.

Kim-Kwang Raymond Choo (editor): author's other books


Who wrote Handbook of Big Data Analytics and Forensics? Find out the surname, the name of the author of the book and a list of all author's works by series.

Handbook of Big Data Analytics and Forensics — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Handbook of Big Data Analytics and Forensics" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Handbook of Big Data Analytics and Forensics Editors - photo 1
Book cover of Handbook of Big Data Analytics and Forensics
Editors
Kim-Kwang Raymond Choo and Ali Dehghantanha
Handbook of Big Data Analytics and Forensics
Logo of the publisher Editors Kim-Kwang Raymond Choo Department of - photo 2
Logo of the publisher
Editors
Kim-Kwang Raymond Choo
Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA
Ali Dehghantanha
School of Computer Science, University of Guelph, Guelph, ON, Canada
ISBN 978-3-030-74752-7 e-ISBN 978-3-030-74753-4
https://doi.org/10.1007/978-3-030-74753-4
Springer Nature Switzerland AG 2022
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Acknowledgments

This book would not have been possible without the commitment of the contributing authors, who dedicated their time and efforts to research work and shared their findings in this book.

We are also extremely grateful to Springer and their staff for their support in this project. They have been most accommodating of our schedule and helping to keep us on track.

Contents
Hossein Mohammadi Rouzbahani , Ali Dehghantanha and Kim-Kwang Raymond Choo
Isis Diaz Linares , Angelife Pardo , Eric Patch , Ali Dehghantanha and Kim-Kwang Raymond Choo
Samira Eisaloo Gharghasheh and Tim Steinbach
Dilip Kumar Sahoo
Nidhip Chikhalia and Yash Dhawan
Alex Chenxingyu Chen and Kenneth Wulff
Akansha Handa and Prabhat Semwal
Kassidy Marsh and Samira Eisaloo Gharghasheh
Prabhat Semwal and Akansha Handa
Dilip Sahoo and Aaruni Upadhyay
Dilip Sahoo and Yash Dhawan
Adesola Anidu and Zibekieni Obuzor
Samira Eisaloo Gharghasheh and Shahrzad Hadayeghparast
Alex Chenxingyu Chen and Kenneth Wulff
Akansha Handa , Yash Dhawan and Prabhat Semwal
Aaruni Upadhyay , Samira Eisaloo Gharghasheh and Sanaz Nakhodchi
Kassidy Marsh and Hamed Haddadpajouh
Zibekieni Obuzor and Adesola Anidu
Springer Nature Switzerland AG 2022
K.-K. R. Choo, A. Dehghantanha (eds.) Handbook of Big Data Analytics and Forensics https://doi.org/10.1007/978-3-030-74753-4_1
Big Data Analytics and Forensics: An Overview
Hossein Mohammadi Rouzbahani
(1)
Smart Cyber Physical Systems Lab, School of Engineering, University of Guelph, Guelph, ON, Canada
(2)
Cyber Science Lab, School of Computer Science, University of Guelph, Guelph, ON, Canada
(3)
Department of Information Systems and Cyber Security, The University of Texas atSanAntonio, SanAntonio, TX, USA
Hossein Mohammadi Rouzbahani (Corresponding author)
Email:
Ali Dehghantanha
Email:
Kim-Kwang Raymond Choo
Email:
Keywords
Big data Data analytics Digital forensics Malware Privacy Security Machine learning Deep learning
Introduction

As our society becomes smarter and more digitally connected, more data will be generated, processed, disseminated, analyzed, and stored (e.g., on cloud computing systems). Such big data can be structured and unstructured, and are generated by different sources (e.g., Internet of Things (IoT) devices and other information and communications technologies ICT) with varying formats []. Volume and velocity refer to the size and formation speed of information respectively, while variety refers to the diversity in data format and representation type. Veracity refers to the accuracy and reliability of data, and finally, value attempts to quantify usefulness of the data.

In a typical smart city setting, for example, IoT devices and other systems (e.g., edge/fog computing devices and servers) collect and process data before sending them to cloud-based systems via high speed communication networks [].

Given the current trend in artificial intelligence, machine learning and deep learning, there have also been attempts to build on the advances in these areas to enhance security and forensic capabilities. For example, contemporary and emerging big data analytics approaches include generative-, discriminative- and hybrid-based methods. Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) are two examples of supervised learning-based methods, which can facilitate the identification of movement pattern and human activity, as well as mobility prediction [].

The procedure of detecting, collecting, storing, analyzing and presenting of big data is also referred to as big data forensic. However, big data forensics is challenging, particularly if we also need to preserve user privacy. These challenges can be technical (use of strong encryption algorithms, the volume and veracity of data to be processed, etc.), legal (e.g., evidence and privacy legislations), and due to resources (or lack of), etc. []. Several of these challenges will also be discussed in this book.

Book Outline

We will now describe the remaining 17 chapters.

Chapter ] presented a comparative summary of the performance for the different algorithms used to secure industrial cyberspace.

Then, Chapter ], four different supervised learning methods K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Decision Tree (DT), and Random Forest (RF) were employed to build models to detect cyber-attack activities on a water treatment plant.

Evaluation of scalable fair clustering machine learning methods for threat hunting in CPSs were presented in Chapter ] presented a summary of the performance for different learning-based approaches in OSX malware detection.

Chapter ] studied the effect of scalable clustering algorithm on accuracy, by experimenting with a IoT malware opcodes dataset.

References
  1. H.M. Rouzbahani, H. Karimipour, A. Rahimnejad, A. Dehghantanha, G. Srivastava, Anomaly detection in cyber-physical systems using machine learning, in
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Handbook of Big Data Analytics and Forensics»

Look at similar books to Handbook of Big Data Analytics and Forensics. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Handbook of Big Data Analytics and Forensics»

Discussion, reviews of the book Handbook of Big Data Analytics and Forensics and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.