AI in Cybersecurity

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday’s security incidents no longer enables experts to predict and prevent tomorrow’s attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.

Author(s): Leslie F. Sikos (Editor)
Series: Intelligent Systems Reference Library
Publisher: Springer
Year: 2018

Language: English
Commentary: True PDF
Pages: 205
Tags: Artificial Intelligence; Machine Learning; Knowledge; Cybersecurity; Netwoks; Forensic Analysis; Ontologies; Network Intrusion Detection; Android

Front Matter ....Pages i-xvii
OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge (Leslie F. Sikos)....Pages 1-17
Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness (Leslie F. Sikos, Dean Philp, Catherine Howard, Shaun Voigt, Markus Stumptner, Wolfgang Mayer)....Pages 19-45
The Security of Machine Learning Systems (Luis Muñoz-González, Emil C. Lupu)....Pages 47-79
Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities (Mohammed Almukaynizi, Eric Nunes, Krishna Dharaiya, Manoj Senguttuvan, Jana Shakarian, Paulo Shakarian)....Pages 81-113
Applying Artificial Intelligence Methods to Network Attack Detection (Alexander Branitskiy, Igor Kotenko)....Pages 115-149
Machine Learning Algorithms for Network Intrusion Detection (Jie Li, Yanpeng Qu, Fei Chao, Hubert P. H. Shum, Edmond S. L. Ho, Longzhi Yang)....Pages 151-179
Android Application Analysis Using Machine Learning Techniques (Takeshi Takahashi, Tao Ban)....Pages 181-205