Machine Learning in Cyber Trust: Security, Privacy, and Reliability
โ Scribed by Lui Sha, Sathish Gopalakrishnan, Xue Liu, Qixin Wang (auth.), Philip S. Yu, Jeffrey J. P. Tsai (eds.)
- Publisher
- Springer US
- Year
- 2009
- Tongue
- English
- Leaves
- 363
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.
This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the security, privacy, and reliability issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state of the practice in this important area, and giving a classification of existing work.
Specific features include the following:
- A survey of various approaches using machine learning/data mining techniques to enhance the traditional security mechanisms of databases
- A discussion of detection of SQL Injection attacks and anomaly detection for defending against insider threats
- An approach to detecting anomalies in a graph-based representation of the data collected during the monitoring of cyber and other infrastructures
- An empirical study of seven online-learning methods on the task of detecting malicious executables
- A novel network intrusion detection framework for mining and detecting sequential intrusion patterns
- A solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems
- An image encryption algorithm based on a chaotic cellular neural network to deal with information security and assurance
- An overview of data privacy research, examining the achievements, challenges and opportunities while pinpointing individual research efforts on the grand map of data privacy protection
- An algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data
- An approach for assessing the reliability of SOA-based systems using AI reasoning techniques
- The models, properties, and applications of context-aware Web services, including an ontology-based context model to enable formal description and acquisition of contextual information pertaining to service requestors and services
Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.
โฆ Table of Contents
Front Matter....Pages 1-13
Front Matter....Pages 1-1
Cyber-Physical Systems: A New Frontier....Pages 3-13
Front Matter....Pages 15-15
Misleading Learners: Co-opting Your Spam Filter....Pages 17-51
Survey of Machine Learning Methods for Database Security....Pages 53-71
Identifying Threats Using Graph-based Anomaly Detection....Pages 73-108
On the Performance of Online Learning Methods for Detecting Malicious Executables....Pages 109-132
Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems....Pages 133-154
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features....Pages 155-181
Image Encryption and Chaotic Cellular Neural Network....Pages 183-213
Front Matter....Pages 215-215
From Data Privacy to Location Privacy....Pages 217-246
Privacy Preserving Nearest Neighbor Search....Pages 247-276
Front Matter....Pages 277-277
High-Confidence Compositional Reliability Assessment of SOA-Based Systems Using Machine Learning Techniques....Pages 279-322
Model, Properties, and Applications of Context-Aware Web Services....Pages 323-358
Back Matter....Pages 359-362
โฆ Subjects
Artificial Intelligence (incl. Robotics); Data Mining and Knowledge Discovery; Systems and Data Security
๐ SIMILAR VOLUMES
<p><span>This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are no
<p><p>This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.</p><p>The 16 full and 6 short papers presented in this volume were carefully reviewed and selected fro
"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--
As the advancement of technology continues, cyber security continues to play a significant role in today's world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prev
This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyb