舉報

會員
Mastering Machine Learning for Penetration Testing
Cybersecurityiscrucialforbothbusinessesandindividuals.Assystemsaregettingsmarter,wenowseemachinelearninginterruptingcomputersecurity.Withtheadoptionofmachinelearninginupcomingsecurityproducts,it’simportantforpentestersandsecurityresearcherstounderstandhowthesesystemswork,andtobreachthemfortestingpurposes.Thisbookbeginswiththebasicsofmachinelearningandthealgorithmsusedtobuildrobustsystems.Onceyou’vegainedafairunderstandingofhowsecurityproductsleveragemachinelearning,you'lldiveintothecoreconceptsofbreachingsuchsystems.Throughpracticalusecases,you’llseehowtofindloopholesandsurpassaself-learningsecuritysystem.Asyoumakeyourwaythroughthechapters,you’llfocusontopicssuchasnetworkintrusiondetectionandAVandIDSevasion.We’llalsocoverthebestpracticeswhenidentifyingambiguities,andextensivetechniquestobreachanintelligentsystem.Bytheendofthisbook,youwillbewell-versedwithidentifyingloopholesinaself-learningsecuritysystemandwillbeabletoefficientlybreachamachinelearningsystem.
最新章節
- Leave a review - let other readers know what you think
- Other Books You May Enjoy
- Chapter 10 – Best Practices for Machine Learning and Feature Engineering
- Chapter 9 – Bypass Machine Learning Malware Detectors
- Chapter 8 – Evading Intrusion Detection Systems with Adversarial Machine Learning
- Chapter 7 – Detecting Advanced Persistent Threats
品牌:中圖公司
上架時間:2021-06-25 20:43:58
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Leave a review - let other readers know what you think 更新時間:2021-06-25 21:03:42
- Other Books You May Enjoy
- Chapter 10 – Best Practices for Machine Learning and Feature Engineering
- Chapter 9 – Bypass Machine Learning Malware Detectors
- Chapter 8 – Evading Intrusion Detection Systems with Adversarial Machine Learning
- Chapter 7 – Detecting Advanced Persistent Threats
- Chapter 6 – Machine Learning in Anomaly Detection Systems
- Chapter 5 – Botnet Detection with Machine Learning
- Chapter 4 – Malware Detection with Deep Learning
- Chapter 3 – Malware Detection with API Calls and PE Headers
- Chapter 2 – Phishing Domain Detection
- Chapter 1 – Introduction to Machine Learning in Pentesting
- Assessments
- Further reading
- Questions
- Summary
- Business contexts
- Data handling
- Coding
- Machine learning architecture
- Selecting models and learning curves
- Speed up training with GPUs
- Project Jupyter
- Information security datasets
- Best practices for machine learning
- Tree-based feature selection
- Ridge regression L2
- Lasso linear regression L1
- Embedded methods
- Recursive feature elimination
- Backward elimination
- Forward selection
- Wrapper methods
- Chi-square
- Analysis of variance
- Linear discriminant analysis
- Pearson's correlation
- Filter methods
- Feature selection algorithms
- Feature engineering in machine learning
- Technical requirements
- Best Practices for Machine Learning and Feature Engineering
- Further reading
- Questions
- Summary
- Reinforcement learning
- Bypassing machine learning with reinforcement learning
- MalGAN
- The discriminator
- The generator
- Bypassing next generation malware detectors with generative adversarial networks
- EvadeML
- Deep-pwning
- Foolbox
- Adversarial deep learning
- Technical requirements
- Bypassing Machine Learning Malware Detectors
- Further reading
- Questions
- Summary
- Evading intrusion detection systems with adversarial network systems
- EvadeML-Zoo
- The AML library
- CleverHans
- Adversarial features
- Adversarial clustering
- Poisoning attacks
- Evasion attacks
- Adversarial machine learning
- Detecting overfitting
- Overfitting and underfitting with Python
- Overfitting and underfitting
- Adversarial machine learning algorithms
- Technical requirements
- Evading Intrusion Detection Systems
- Questions
- Summary
- Machine learning with the ELK Stack using the X-Pack plugin
- Logstash
- Kibana
- Elasticsearch
- Threat hunting with the ELK Stack
- The diamond model of intrusion analysis
- The cyber kill chain
- Threat-hunting methodology
- Threats and risk analysis
- Technical requirements
- Detecting Advanced Persistent Threats
- Further reading
- Questions
- Summary
- The Kale stack
- Building your own IDS
- Anomaly-based IDS
- NIDS
- HIDS
- The detection of network anomalies
- Network attacks taxonomy
- Static rules technique
- An overview of anomaly detection techniques
- Technical requirements
- Machine Learning in Anomaly Detection Systems
- Further reading
- Questions
- Summary
- Visualization with seaborn
- How to build a Twitter bot detector
- Building a botnet detector model with multiple machine learning techniques
- Botnet overview
- Technical requirements
- Botnet Detection with Machine Learning
- Further reading
- Questions
- Summary
- Promises and challenges in applying deep learning to malware detection
- Malware detection with CNNs
- Boltzmann machine networks
- Hopfield networks
- Long Short Term Memory networks
- Recurrent Neural Networks (RNNs)
- Convolutional Neural Networks (CNNs)
- Deep learning model with convolutional neural networks and malware visualization
- Deep learning model using PE headers
- Implementing neural networks in Python
- Artificial neural network overview
- Technical requirements
- Malware Detection with Deep Learning
- Further reading
- Questions
- Summary
- Machine learning malware detection using API calls
- Machine learning malware detection using PE headers
- Portable Executable format files
- Evasion techniques
- Memory malware analysis
- Dynamic malware analysis
- Static malware analysis
- Malware analysis
- Malware overview
- Technical requirements
- Malware Detection with API Calls and PE Headers
- Questions
- Summary
- Spam detection with NLTK
- Open source NLP libraries
- NLP in-depth overview
- Phishing detection with decision trees
- Phishing detection with logistic regression
- Building real-time phishing attack detectors using different machine learning models
- Steps of social engineering penetration testing
- Social Engineering Engagement Framework
- Social engineering overview
- Technical requirements
- Phishing Domain Detection
- Further reading
- Questions
- Summary
- Deep Exploit
- Machine learning in penetration testing - promises and challenges
- Theano
- NLTK
- scikit-learn
- Matplotlib
- pandas
- Keras
- TensorFlow
- SciPy
- NumPy
- Machine learning development environments and Python libraries
- Improving classification with ensemble learning
- Dimensionality reduction
- Performance evaluation
- Reinforcement
- Clustering with k-means
- Logistic regression
- Linear regression
- Artificial neural networks
- Unsupervised
- Semi-supervised
- Decision trees
- Support vector machines
- Bayesian classifiers
- Supervised
- Machine learning models and algorithms
- Artificial intelligence and machine learning
- Technical requirements
- Introduction to Machine Learning in Pentesting
- Reviews
- Get in touch
- Conventions used
- Download the color images
- Download the example code files
- To get the most out of this book
- What this book covers
- Who this book is for
- Preface
- Packt is searching for authors like you
- About the reviewer
- About the author
- Contributors
- PacktPub.com
- Why subscribe?
- Packt Upsell
- Dedication
- 版權信息
- 封面
- 封面
- 版權信息
- Dedication
- Packt Upsell
- Why subscribe?
- PacktPub.com
- Contributors
- About the author
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the example code files
- Download the color images
- Conventions used
- Get in touch
- Reviews
- Introduction to Machine Learning in Pentesting
- Technical requirements
- Artificial intelligence and machine learning
- Machine learning models and algorithms
- Supervised
- Bayesian classifiers
- Support vector machines
- Decision trees
- Semi-supervised
- Unsupervised
- Artificial neural networks
- Linear regression
- Logistic regression
- Clustering with k-means
- Reinforcement
- Performance evaluation
- Dimensionality reduction
- Improving classification with ensemble learning
- Machine learning development environments and Python libraries
- NumPy
- SciPy
- TensorFlow
- Keras
- pandas
- Matplotlib
- scikit-learn
- NLTK
- Theano
- Machine learning in penetration testing - promises and challenges
- Deep Exploit
- Summary
- Questions
- Further reading
- Phishing Domain Detection
- Technical requirements
- Social engineering overview
- Social Engineering Engagement Framework
- Steps of social engineering penetration testing
- Building real-time phishing attack detectors using different machine learning models
- Phishing detection with logistic regression
- Phishing detection with decision trees
- NLP in-depth overview
- Open source NLP libraries
- Spam detection with NLTK
- Summary
- Questions
- Malware Detection with API Calls and PE Headers
- Technical requirements
- Malware overview
- Malware analysis
- Static malware analysis
- Dynamic malware analysis
- Memory malware analysis
- Evasion techniques
- Portable Executable format files
- Machine learning malware detection using PE headers
- Machine learning malware detection using API calls
- Summary
- Questions
- Further reading
- Malware Detection with Deep Learning
- Technical requirements
- Artificial neural network overview
- Implementing neural networks in Python
- Deep learning model using PE headers
- Deep learning model with convolutional neural networks and malware visualization
- Convolutional Neural Networks (CNNs)
- Recurrent Neural Networks (RNNs)
- Long Short Term Memory networks
- Hopfield networks
- Boltzmann machine networks
- Malware detection with CNNs
- Promises and challenges in applying deep learning to malware detection
- Summary
- Questions
- Further reading
- Botnet Detection with Machine Learning
- Technical requirements
- Botnet overview
- Building a botnet detector model with multiple machine learning techniques
- How to build a Twitter bot detector
- Visualization with seaborn
- Summary
- Questions
- Further reading
- Machine Learning in Anomaly Detection Systems
- Technical requirements
- An overview of anomaly detection techniques
- Static rules technique
- Network attacks taxonomy
- The detection of network anomalies
- HIDS
- NIDS
- Anomaly-based IDS
- Building your own IDS
- The Kale stack
- Summary
- Questions
- Further reading
- Detecting Advanced Persistent Threats
- Technical requirements
- Threats and risk analysis
- Threat-hunting methodology
- The cyber kill chain
- The diamond model of intrusion analysis
- Threat hunting with the ELK Stack
- Elasticsearch
- Kibana
- Logstash
- Machine learning with the ELK Stack using the X-Pack plugin
- Summary
- Questions
- Evading Intrusion Detection Systems
- Technical requirements
- Adversarial machine learning algorithms
- Overfitting and underfitting
- Overfitting and underfitting with Python
- Detecting overfitting
- Adversarial machine learning
- Evasion attacks
- Poisoning attacks
- Adversarial clustering
- Adversarial features
- CleverHans
- The AML library
- EvadeML-Zoo
- Evading intrusion detection systems with adversarial network systems
- Summary
- Questions
- Further reading
- Bypassing Machine Learning Malware Detectors
- Technical requirements
- Adversarial deep learning
- Foolbox
- Deep-pwning
- EvadeML
- Bypassing next generation malware detectors with generative adversarial networks
- The generator
- The discriminator
- MalGAN
- Bypassing machine learning with reinforcement learning
- Reinforcement learning
- Summary
- Questions
- Further reading
- Best Practices for Machine Learning and Feature Engineering
- Technical requirements
- Feature engineering in machine learning
- Feature selection algorithms
- Filter methods
- Pearson's correlation
- Linear discriminant analysis
- Analysis of variance
- Chi-square
- Wrapper methods
- Forward selection
- Backward elimination
- Recursive feature elimination
- Embedded methods
- Lasso linear regression L1
- Ridge regression L2
- Tree-based feature selection
- Best practices for machine learning
- Information security datasets
- Project Jupyter
- Speed up training with GPUs
- Selecting models and learning curves
- Machine learning architecture
- Coding
- Data handling
- Business contexts
- Summary
- Questions
- Further reading
- Assessments
- Chapter 1 – Introduction to Machine Learning in Pentesting
- Chapter 2 – Phishing Domain Detection
- Chapter 3 – Malware Detection with API Calls and PE Headers
- Chapter 4 – Malware Detection with Deep Learning
- Chapter 5 – Botnet Detection with Machine Learning
- Chapter 6 – Machine Learning in Anomaly Detection Systems
- Chapter 7 – Detecting Advanced Persistent Threats
- Chapter 8 – Evading Intrusion Detection Systems with Adversarial Machine Learning
- Chapter 9 – Bypass Machine Learning Malware Detectors
- Chapter 10 – Best Practices for Machine Learning and Feature Engineering
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時間:2021-06-25 21:03:42