舉報

會員
Machine Learning for Cybersecurity Cookbook
Emmanuel Tsukerman 著
更新時間:2021-06-24 12:29:54
開會員,本書免費讀 >
Organizationstodayfaceamajorthreatintermsofcybersecurity,frommaliciousURLstocredentialreuse,andhavingrobustsecuritysystemscanmakeallthedifference.Withthisbook,you'lllearnhowtousePythonlibrariessuchasTensorFlowandscikit-learntoimplementthelatestartificialintelligence(AI)techniquesandhandlechallengesfacedbycybersecurityresearchers.You'llbeginbyexploringvariousmachinelearning(ML)techniquesandtipsforsettingupasecurelabenvironment.Next,you'llimplementkeyMLalgorithmssuchasclustering,gradientboosting,randomforest,andXGBoost.Thebookwillguideyouthroughconstructingclassifiersandfeaturesformalware,whichyou'lltrainandtestonrealsamples.Asyouprogress,you'llbuildself-learning,reliantsystemstohandlecybersecuritytaskssuchasidentifyingmaliciousURLs,spamemaildetection,intrusiondetection,networkprotection,andtrackinguserandprocessbehavior.Later,you'llapplygenerativeadversarialnetworks(GANs)andautoencoderstoadvancedsecuritytasks.Finally,you'lldelveintosecureandprivateAItoprotecttheprivacyrightsofconsumersusingyourMLmodels.Bytheendofthisbook,you'llhavetheskillsyouneedtotacklereal-worldproblemsfacedinthecybersecuritydomainusingarecipe-basedapproach.
最新章節
- Leave a review - let other readers know what you think
- Other Books You May Enjoy
- How it works...
- How to do it...
- Getting ready
- Using Python virtual environments
品牌:中圖公司
上架時間:2021-06-24 12:05:53
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Leave a review - let other readers know what you think 更新時間:2021-06-24 12:29:54
- Other Books You May Enjoy
- How it works...
- How to do it...
- Getting ready
- Using Python virtual environments
- How it works...
- How to do it...
- Getting ready
- Setting up a virtual lab environment
- Appendix
- How it works...
- How to do it...
- Getting ready
- Differential privacy using TensorFlow Privacy
- How it works...
- How to do it...
- Getting ready
- Testing the adversarial robustness of neural networks
- How it works…
- How to do it…
- Getting ready
- Private deep learning prediction
- How it works…
- How to do it…
- Getting ready
- Encrypted computation
- How it works...
- How to do it…
- Getting ready
- Federated learning
- Technical requirements
- Secure and Private AI
- How it works…
- How to do it…
- Getting ready
- HIPAA data breaches – data exploration and visualization
- How it works...
- How to do it...
- Getting ready
- Encryption using deep learning
- There's more
- How it works…
- How to do it...
- Getting ready
- ML attacks on PUFs
- How it works…
- How to do it...
- Getting ready
- ML-based steganalysis
- How it works…
- How to do it…
- Getting ready
- Deep steganography
- There's more
- How it works…
- How to do it…
- Getting ready
- Deep learning for password cracking
- How it works…
- How to do it…
- Getting ready
- Assessing password security using ML
- Technical requirements
- Securing and Attacking Data with Machine Learning
- How it works…
- How to do it…
- Getting ready
- Wireless indoor localization
- How it works...
- How to do it...
- Getting ready
- Ad blocking using machine learning
- How it works...
- How to do it...
- Getting ready
- Counterfeit bank note detection
- How it works…
- How to do it…
- Getting ready
- Credit card fraud detection
- How it works…
- How to do it…
- Getting ready
- Detecting DDoS
- How it works…
- How to do it...
- Getting ready
- Employing anomaly detection for insider threats
- How it works...
- How to do it…
- Getting ready
- Feature engineering for insider threat detection
- Insider threat detection
- How it works…
- How to do it…
- Getting ready
- Botnet traffic detection
- How it works…
- How to do it…
- Getting ready
- Network behavior anomaly detection
- How it works…
- How to do it…
- Getting ready
- Capturing network traffic
- How it works…
- How to do it…
- Getting ready
- Phishing URL detection
- How it works…
- How to do it...
- Getting ready
- Spam filtering using machine learning
- Technical requirements
- Automatic Intrusion Detection
- How it works…
- How to do it…
- Getting ready
- Deep learning-based system for the automatic detection of software vulnerabilities
- How it works…
- How to do it…
- Getting ready
- Deep-pwning
- How it works…
- How to do it…
- Getting ready
- Malicious URL detector
- How it works...
- How to do it...
- Getting ready
- Keystroke dynamics
- How it works...
- How to do it…
- Getting ready
- IoT device type identification using machine learning
- How it works…
- Predicting
- Training
- Collecting data
- How to do it…
- Getting ready
- Deanonymizing Tor using machine learning
- How it works…
- How to do it...
- Getting ready
- Web server vulnerability scanner using machine learning (GyoiThon)
- How it works…
- How to do it...
- Getting ready
- DeepExploit
- How it works…
- How to do it...
- Getting ready
- Neural network-assisted fuzzing
- How it works…
- How to do it...
- Getting ready
- Training a CAPTCHA solver neural network
- How it works…
- How to do it...
- Getting ready
- Processing a CAPTCHA dataset
- CAPTCHA breaker
- Technical requirements
- Penetration Testing Using Machine Learning
- How it works…
- How to do it…
- Getting ready
- Fake news
- How it works...
- How to do it...
- Getting ready
- Generating fake reviews
- How it works…
- How to do it...
- Getting ready
- Training a fake review generator
- Fake review generator
- How it works…
- How to do it...
- Getting ready
- Social Mapper
- How it works…
- How to do it...
- Getting ready
- Personality analysis
- How it works…
- How to do it...
- Getting ready
- Lie detection using machine learning
- How it works…
- How to do it...
- Getting ready
- Deepfake recognition
- How it works…
- How to do it...
- Getting ready
- Deepfake
- How it works…
- How to do it…
- Getting ready
- Facial recognition
- How it works…
- How to do it...
- Getting ready
- Speech recognition for OSINT
- How it works…
- How to do it...
- Getting ready
- Voice impersonation
- How it works…
- How to do it...
- Getting ready
- Twitter spear phishing bot
- Technical requirements
- Machine Learning for Social Engineering
- How it works…
- How to do it...
- Getting ready
- Tracking malware drift
- How it works…
- How to do it...
- Getting ready
- MalGAN – creating evasive malware
- How it works…
- How to do it...
- Getting ready
- Building a classifier for packers
- How it works…
- How to do it...
- Getting ready
- Assembling a packed sample dataset
- How it works…
- How to do it...
- Getting ready
- Using packers
- Tackling packed malware
- How it works…
- How to do it...
- Getting ready
- MalConv – end-to-end deep learning for malicious PE detection
- How it works…
- How to do it...
- Getting ready
- Building a dynamic malware classifier
- See also
- How it works…
- How to do it...
- Getting ready
- Extracting N-grams quickly using the hash-gram algorithm
- How it works…
- How to do it...
- Getting ready
- Featurizing PDF files
- How it works…
- How to do it...
- Getting ready
- Detecting obfuscated JavaScript
- Technical requirements
- Advanced Malware Detection
- How it works…
- How to do it...
- Getting ready
- Handling type I and type II errors
- How it works…
- How to do it...
- Getting ready
- Tackling class imbalance
- How it works…
- How to do it...
- Getting ready
- Building a static malware detector
- How it works…
- How to do it...
- Getting ready
- Selecting the best N-grams
- How it works...
- How to do it...
- Getting ready
- Extracting N-grams
- How it works...
- How to do it...
- Getting ready
- Measuring the similarity between two files
- How it works...
- How to do it...
- Getting ready
- Measuring the similarity between two strings
- How it works...
- How to do it...
- Getting ready
- Classifying files by type
- How it works...
- How to do it...
- Getting ready
- Scraping GitHub for files of a specific type
- Using machine learning to detect the file type
- How it works...
- How to do it...
- Getting ready
- Malware dynamic analysis
- How it works...
- How to do it...
- Getting ready
- Featurizing the PE header
- How it works...
- How to do it...
- Getting ready
- Examining the PE header
- How it works…
- How to do it…
- Getting ready
- YARA
- How it works...
- How to do it...
- Getting ready
- Computing the hash of a sample
- Malware static analysis
- Technical requirements
- Machine Learning-Based Malware Detection
- How it works...
- How to do it...
- Getting ready
- Hyperparameter tuning with scikit-optimize
- How it works...
- How to do it…
- Getting ready
- Natural language processing using a hashing vectorizer and tf-idf with scikit-learn
- How it works...
- How to do it...
- Getting ready
- Anomaly detection with Isolation Forest
- How it works...
- How to do it...
- Getting ready
- Analyzing time series using statsmodels
- How it works...
- How to do it...
- Getting ready
- Training an XGBoost classifier
- How it works...
- How to do it...
- Getting ready
- Performing clustering using scikit-learn
- How it works...
- How to do it...
- Getting ready
- Generating text using Markov chains
- How it works...
- How to do it...
- Getting ready
- Summarizing large data using principal component analysis
- How it works...
- How to do it...
- Getting ready
- Standardizing your data
- How it works...
- How to do it...
- Getting ready
- Train-test-splitting your data
- Technical requirements
- Machine Learning for Cybersecurity
- Reviews
- Get in touch
- See also
- There's more…
- How it works…
- How to do it…
- Getting ready
- Sections
- Conventions used
- Download the color images
- Download the example code files
- To get the most out of this book
- What this book covers
- Who this book is for
- Preface
- Packt is searching for authors like you
- About the reviewers
- About the author
- Contributors
- Why subscribe?
- About Packt
- Machine Learning for Cybersecurity Cookbook
- Copyright and Credits
- Title Page
- coverpage
- coverpage
- Title Page
- Copyright and Credits
- Machine Learning for Cybersecurity Cookbook
- About Packt
- Why subscribe?
- Contributors
- About the author
- About the reviewers
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the example code files
- Download the color images
- Conventions used
- Sections
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Get in touch
- Reviews
- Machine Learning for Cybersecurity
- Technical requirements
- Train-test-splitting your data
- Getting ready
- How to do it...
- How it works...
- Standardizing your data
- Getting ready
- How to do it...
- How it works...
- Summarizing large data using principal component analysis
- Getting ready
- How to do it...
- How it works...
- Generating text using Markov chains
- Getting ready
- How to do it...
- How it works...
- Performing clustering using scikit-learn
- Getting ready
- How to do it...
- How it works...
- Training an XGBoost classifier
- Getting ready
- How to do it...
- How it works...
- Analyzing time series using statsmodels
- Getting ready
- How to do it...
- How it works...
- Anomaly detection with Isolation Forest
- Getting ready
- How to do it...
- How it works...
- Natural language processing using a hashing vectorizer and tf-idf with scikit-learn
- Getting ready
- How to do it…
- How it works...
- Hyperparameter tuning with scikit-optimize
- Getting ready
- How to do it...
- How it works...
- Machine Learning-Based Malware Detection
- Technical requirements
- Malware static analysis
- Computing the hash of a sample
- Getting ready
- How to do it...
- How it works...
- YARA
- Getting ready
- How to do it…
- How it works…
- Examining the PE header
- Getting ready
- How to do it...
- How it works...
- Featurizing the PE header
- Getting ready
- How to do it...
- How it works...
- Malware dynamic analysis
- Getting ready
- How to do it...
- How it works...
- Using machine learning to detect the file type
- Scraping GitHub for files of a specific type
- Getting ready
- How to do it...
- How it works...
- Classifying files by type
- Getting ready
- How to do it...
- How it works...
- Measuring the similarity between two strings
- Getting ready
- How to do it...
- How it works...
- Measuring the similarity between two files
- Getting ready
- How to do it...
- How it works...
- Extracting N-grams
- Getting ready
- How to do it...
- How it works...
- Selecting the best N-grams
- Getting ready
- How to do it...
- How it works…
- Building a static malware detector
- Getting ready
- How to do it...
- How it works…
- Tackling class imbalance
- Getting ready
- How to do it...
- How it works…
- Handling type I and type II errors
- Getting ready
- How to do it...
- How it works…
- Advanced Malware Detection
- Technical requirements
- Detecting obfuscated JavaScript
- Getting ready
- How to do it...
- How it works…
- Featurizing PDF files
- Getting ready
- How to do it...
- How it works…
- Extracting N-grams quickly using the hash-gram algorithm
- Getting ready
- How to do it...
- How it works…
- See also
- Building a dynamic malware classifier
- Getting ready
- How to do it...
- How it works…
- MalConv – end-to-end deep learning for malicious PE detection
- Getting ready
- How to do it...
- How it works…
- Tackling packed malware
- Using packers
- Getting ready
- How to do it...
- How it works…
- Assembling a packed sample dataset
- Getting ready
- How to do it...
- How it works…
- Building a classifier for packers
- Getting ready
- How to do it...
- How it works…
- MalGAN – creating evasive malware
- Getting ready
- How to do it...
- How it works…
- Tracking malware drift
- Getting ready
- How to do it...
- How it works…
- Machine Learning for Social Engineering
- Technical requirements
- Twitter spear phishing bot
- Getting ready
- How to do it...
- How it works…
- Voice impersonation
- Getting ready
- How to do it...
- How it works…
- Speech recognition for OSINT
- Getting ready
- How to do it...
- How it works…
- Facial recognition
- Getting ready
- How to do it…
- How it works…
- Deepfake
- Getting ready
- How to do it...
- How it works…
- Deepfake recognition
- Getting ready
- How to do it...
- How it works…
- Lie detection using machine learning
- Getting ready
- How to do it...
- How it works…
- Personality analysis
- Getting ready
- How to do it...
- How it works…
- Social Mapper
- Getting ready
- How to do it...
- How it works…
- Fake review generator
- Training a fake review generator
- Getting ready
- How to do it...
- How it works…
- Generating fake reviews
- Getting ready
- How to do it...
- How it works...
- Fake news
- Getting ready
- How to do it…
- How it works…
- Penetration Testing Using Machine Learning
- Technical requirements
- CAPTCHA breaker
- Processing a CAPTCHA dataset
- Getting ready
- How to do it...
- How it works…
- Training a CAPTCHA solver neural network
- Getting ready
- How to do it...
- How it works…
- Neural network-assisted fuzzing
- Getting ready
- How to do it...
- How it works…
- DeepExploit
- Getting ready
- How to do it...
- How it works…
- Web server vulnerability scanner using machine learning (GyoiThon)
- Getting ready
- How to do it...
- How it works…
- Deanonymizing Tor using machine learning
- Getting ready
- How to do it…
- Collecting data
- Training
- Predicting
- How it works…
- IoT device type identification using machine learning
- Getting ready
- How to do it…
- How it works...
- Keystroke dynamics
- Getting ready
- How to do it...
- How it works...
- Malicious URL detector
- Getting ready
- How to do it…
- How it works…
- Deep-pwning
- Getting ready
- How to do it…
- How it works…
- Deep learning-based system for the automatic detection of software vulnerabilities
- Getting ready
- How to do it…
- How it works…
- Automatic Intrusion Detection
- Technical requirements
- Spam filtering using machine learning
- Getting ready
- How to do it...
- How it works…
- Phishing URL detection
- Getting ready
- How to do it…
- How it works…
- Capturing network traffic
- Getting ready
- How to do it…
- How it works…
- Network behavior anomaly detection
- Getting ready
- How to do it…
- How it works…
- Botnet traffic detection
- Getting ready
- How to do it…
- How it works…
- Insider threat detection
- Feature engineering for insider threat detection
- Getting ready
- How to do it…
- How it works...
- Employing anomaly detection for insider threats
- Getting ready
- How to do it...
- How it works…
- Detecting DDoS
- Getting ready
- How to do it…
- How it works…
- Credit card fraud detection
- Getting ready
- How to do it…
- How it works…
- Counterfeit bank note detection
- Getting ready
- How to do it...
- How it works...
- Ad blocking using machine learning
- Getting ready
- How to do it...
- How it works...
- Wireless indoor localization
- Getting ready
- How to do it…
- How it works…
- Securing and Attacking Data with Machine Learning
- Technical requirements
- Assessing password security using ML
- Getting ready
- How to do it…
- How it works…
- Deep learning for password cracking
- Getting ready
- How to do it…
- How it works…
- There's more
- Deep steganography
- Getting ready
- How to do it…
- How it works…
- ML-based steganalysis
- Getting ready
- How to do it...
- How it works…
- ML attacks on PUFs
- Getting ready
- How to do it...
- How it works…
- There's more
- Encryption using deep learning
- Getting ready
- How to do it...
- How it works...
- HIPAA data breaches – data exploration and visualization
- Getting ready
- How to do it…
- How it works…
- Secure and Private AI
- Technical requirements
- Federated learning
- Getting ready
- How to do it…
- How it works...
- Encrypted computation
- Getting ready
- How to do it…
- How it works…
- Private deep learning prediction
- Getting ready
- How to do it…
- How it works…
- Testing the adversarial robustness of neural networks
- Getting ready
- How to do it...
- How it works...
- Differential privacy using TensorFlow Privacy
- Getting ready
- How to do it...
- How it works...
- Appendix
- Setting up a virtual lab environment
- Getting ready
- How to do it...
- How it works...
- Using Python virtual environments
- Getting ready
- How to do it...
- How it works...
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時間:2021-06-24 12:29:54