舉報

會員
Mastering Machine Learning for Penetration Testing
Cybersecurityiscrucialforbothbusinessesandindividuals.Assystemsaregettingsmarter,wenowseemachinelearninginterruptingcomputersecurity.Withtheadoptionofmachinelearninginupcomingsecurityproducts,it’simportantforpentestersandsecurityresearcherstounderstandhowthesesystemswork,andtobreachthemfortestingpurposes.Thisbookbeginswiththebasicsofmachinelearningandthealgorithmsusedtobuildrobustsystems.Onceyou’vegainedafairunderstandingofhowsecurityproductsleveragemachinelearning,you'lldiveintothecoreconceptsofbreachingsuchsystems.Throughpracticalusecases,you’llseehowtofindloopholesandsurpassaself-learningsecuritysystem.Asyoumakeyourwaythroughthechapters,you’llfocusontopicssuchasnetworkintrusiondetectionandAVandIDSevasion.We’llalsocoverthebestpracticeswhenidentifyingambiguities,andextensivetechniquestobreachanintelligentsystem.Bytheendofthisbook,youwillbewell-versedwithidentifyingloopholesinaself-learningsecuritysystemandwillbeabletoefficientlybreachamachinelearningsystem.
目錄(206章)
倒序
- 封面
- 版權信息
- Dedication
- Packt Upsell
- Why subscribe?
- PacktPub.com
- Contributors
- About the author
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the example code files
- Download the color images
- Conventions used
- Get in touch
- Reviews
- Introduction to Machine Learning in Pentesting
- Technical requirements
- Artificial intelligence and machine learning
- Machine learning models and algorithms
- Supervised
- Bayesian classifiers
- Support vector machines
- Decision trees
- Semi-supervised
- Unsupervised
- Artificial neural networks
- Linear regression
- Logistic regression
- Clustering with k-means
- Reinforcement
- Performance evaluation
- Dimensionality reduction
- Improving classification with ensemble learning
- Machine learning development environments and Python libraries
- NumPy
- SciPy
- TensorFlow
- Keras
- pandas
- Matplotlib
- scikit-learn
- NLTK
- Theano
- Machine learning in penetration testing - promises and challenges
- Deep Exploit
- Summary
- Questions
- Further reading
- Phishing Domain Detection
- Technical requirements
- Social engineering overview
- Social Engineering Engagement Framework
- Steps of social engineering penetration testing
- Building real-time phishing attack detectors using different machine learning models
- Phishing detection with logistic regression
- Phishing detection with decision trees
- NLP in-depth overview
- Open source NLP libraries
- Spam detection with NLTK
- Summary
- Questions
- Malware Detection with API Calls and PE Headers
- Technical requirements
- Malware overview
- Malware analysis
- Static malware analysis
- Dynamic malware analysis
- Memory malware analysis
- Evasion techniques
- Portable Executable format files
- Machine learning malware detection using PE headers
- Machine learning malware detection using API calls
- Summary
- Questions
- Further reading
- Malware Detection with Deep Learning
- Technical requirements
- Artificial neural network overview
- Implementing neural networks in Python
- Deep learning model using PE headers
- Deep learning model with convolutional neural networks and malware visualization
- Convolutional Neural Networks (CNNs)
- Recurrent Neural Networks (RNNs)
- Long Short Term Memory networks
- Hopfield networks
- Boltzmann machine networks
- Malware detection with CNNs
- Promises and challenges in applying deep learning to malware detection
- Summary
- Questions
- Further reading
- Botnet Detection with Machine Learning
- Technical requirements
- Botnet overview
- Building a botnet detector model with multiple machine learning techniques
- How to build a Twitter bot detector
- Visualization with seaborn
- Summary
- Questions
- Further reading
- Machine Learning in Anomaly Detection Systems
- Technical requirements
- An overview of anomaly detection techniques
- Static rules technique
- Network attacks taxonomy
- The detection of network anomalies
- HIDS
- NIDS
- Anomaly-based IDS
- Building your own IDS
- The Kale stack
- Summary
- Questions
- Further reading
- Detecting Advanced Persistent Threats
- Technical requirements
- Threats and risk analysis
- Threat-hunting methodology
- The cyber kill chain
- The diamond model of intrusion analysis
- Threat hunting with the ELK Stack
- Elasticsearch
- Kibana
- Logstash
- Machine learning with the ELK Stack using the X-Pack plugin
- Summary
- Questions
- Evading Intrusion Detection Systems
- Technical requirements
- Adversarial machine learning algorithms
- Overfitting and underfitting
- Overfitting and underfitting with Python
- Detecting overfitting
- Adversarial machine learning
- Evasion attacks
- Poisoning attacks
- Adversarial clustering
- Adversarial features
- CleverHans
- The AML library
- EvadeML-Zoo
- Evading intrusion detection systems with adversarial network systems
- Summary
- Questions
- Further reading
- Bypassing Machine Learning Malware Detectors
- Technical requirements
- Adversarial deep learning
- Foolbox
- Deep-pwning
- EvadeML
- Bypassing next generation malware detectors with generative adversarial networks
- The generator
- The discriminator
- MalGAN
- Bypassing machine learning with reinforcement learning
- Reinforcement learning
- Summary
- Questions
- Further reading
- Best Practices for Machine Learning and Feature Engineering
- Technical requirements
- Feature engineering in machine learning
- Feature selection algorithms
- Filter methods
- Pearson's correlation
- Linear discriminant analysis
- Analysis of variance
- Chi-square
- Wrapper methods
- Forward selection
- Backward elimination
- Recursive feature elimination
- Embedded methods
- Lasso linear regression L1
- Ridge regression L2
- Tree-based feature selection
- Best practices for machine learning
- Information security datasets
- Project Jupyter
- Speed up training with GPUs
- Selecting models and learning curves
- Machine learning architecture
- Coding
- Data handling
- Business contexts
- Summary
- Questions
- Further reading
- Assessments
- Chapter 1 – Introduction to Machine Learning in Pentesting
- Chapter 2 – Phishing Domain Detection
- Chapter 3 – Malware Detection with API Calls and PE Headers
- Chapter 4 – Malware Detection with Deep Learning
- Chapter 5 – Botnet Detection with Machine Learning
- Chapter 6 – Machine Learning in Anomaly Detection Systems
- Chapter 7 – Detecting Advanced Persistent Threats
- Chapter 8 – Evading Intrusion Detection Systems with Adversarial Machine Learning
- Chapter 9 – Bypass Machine Learning Malware Detectors
- Chapter 10 – Best Practices for Machine Learning and Feature Engineering
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時間:2021-06-25 21:03:42
推薦閱讀
- 自動駕駛網絡:自智時代的網絡架構
- Django 2 by Example
- 物聯網安全與深度學習技術
- 物聯網通信技術
- Building RESTful Web services with Go
- Building Web Applications with ArcGIS
- 深入理解計算機網絡
- 圖解物聯網
- Intelligent Mobile Projects with TensorFlow
- 物聯網商業設計與案例
- 萬物互聯:物聯網核心技術與安全
- Learning Dart
- 計算機網絡(項目教學版)
- 5G時代邊緣計算:LF Edge生態與EdgeGallery技術詳解
- 5G時代:生活方式和商業模式的大變革
- 計算機聯鎖及信號微機監測系統
- M262物聯網控制器應用技術
- 人人時代:無組織的組織力量
- 中國互聯網發展報告(2012)
- 5G波形設計
- Hands-On Full:Stack Development with Swift
- 企業網絡安全建設最佳實踐
- 計算機網絡管理原理與實現
- Go Web Development Cookbook
- 企業云計算:原理、架構與實踐指南
- Hands-On Cloud Development with WildFly
- Cisco IPSec VPN實戰指南
- Real-Time 3D Graphics with WebGL 2
- pytest Quick Start Guide
- Phoenix Web Development