NLSUI OPAC header image
Amazon cover image
Image from Amazon.com

Data mining tools for malware detection

By: Contributor(s): Publication details: London CRC Press 2012Description: 419p xxixISBN:
  • 9781466516489
Subject(s): DDC classification:
  • 1.6424 MAS
Online resources:
Contents:
Contents: PREFACE; Introductory Remarks; Background on Data Mining; Data Mining for Cyber Security; Organization of This Book; Concluding Remarks; ACKNOWLEDGMENTS; THE AUTHORS; COPYRIGHT PERMISSIONS; CHAPTER 1: INTRODUCTION; 1.1 Trends; 1.2 Data Mining and Security Technologies; 1.3 Data Mining for Email Worm Detection; 1.4 Data Mining for Malicious Code Detection; 1.5 Data Mining for Detecting Remote Exploits; 1.6 Data Mining for Botnet Detection; 1.7 Stream Data Mining; 1.8 Emerging Data Mining Tools for Cyber Security Applications; 1.9 Organization of This Book; 1.10 Next Steps; PART I: DATA MINING AND SECURITY; Introduction to Part I: Data Mining and Security; CHAPTER 2: DATA MINING TECHNIQUES; 2.1 Introduction; 2.2 Overview of Data Mining Tasks and Techniques; 2.3 Artificial Neural Network; 2.4 Support Vector Machines; 2.5 Markov Model; 2.6 Association Rule Mining (ARM); 2.7 Multi-Class Problem; 2.7.1 One-vs-One; 2.7.2 One-vs-All; 2.8 Image Mining; 2.8.1 Feature Selection; 2.8.2 Automatic Image Annotation; 2.8.3 Image Classification; 2.9 Summary References; CHAPTER 3: MALWARE; 3.1 Introduction; 3.2 Viruses; 3.3 Worms; 3.4 Trojan Horses; 3.5 Time and Logic Bombs; 3.6 Botnet; 3.7 Spyware; 3.8 Summary References; CHAPTER 4: DATA MINING FOR SECURITY APPLICATIONS; 4.1 Introduction; 4.2 Data Mining for Cyber Security; 4.2.1 Overview; 4.2.2 Cyber-Terrorism, Insider Threats, and External Attacks; 4.2.3 Malicious Intrusions; 4.2.4 Credit Card Fraud and Identity Theft; 4.2.5 Attacks on Critical Infrastructures; 4.2.6 Data Mining for Cyber Security; 4.3 Current Research and Development; 4.4 Summary References; CHAPTER 5: DESIGN AND IMPLEMENTATION OF DATA MINING TOOLS; 5.1 Introduction; 5.2 Intrusion Detection; 5.3 Web Page Surfing Prediction; 5.4 Image Classification; 5.5 Summary; References; CONCLUSION TO PART I; PART II: DATA MINING FOR EMAIL WORM DETECTION; Introduction to Part II; CHAPTER 6: Email Worm Detection; 6.1 Introduction; 6.2 Architecture; 6.3 Related Work; 6.4 Overview of Our Approach; 6.5 Summary; References; CHAPTER 7: DESIGN OF THE DATA MINING TOOL; 7.1 Introduction; 7.2 Architecture; 7.3 Feature Description; 7.3.1 Per-Email Features; 7.3.2 Per-Window Features; 7.4 Feature Reduction Techniques; 7.4.1 Dimension Reduction; 7.4.2 Two-Phase Feature Selection (TPS); 7.4.2.1 Phase I; 7.4.2.2 Phase II; 7.5 Classification Techniques; 7.6 Summary; References; CHAPTER 8: EVALUATION AND RESULTS; 8.1 Introduction; 8.2 Dataset; 8.3 Experimental Setup; 8.4 Results; 8.4.1 Results from Unreduced Data; 8.4.2 Results from PCA-Reduced Data; 8.4.3 Results from Two-Phase Selection; 8.5 Summary; References; CONCLUSION TO PART II; PART III: DATA MINING FOR DETECTING MALICIOUS EXECUTABLES Introduction to Part III CHAPTER 9: MALICIOUS EXECUTABLES; 9.1 Introduction; 9.2 Architecture; 9.3 Related Work; 9.4 Hybrid Feature Retrieval (HFR) Model; 9.5 Summary; References; CHAPTER 10: DESIGN OF THE DATA MINING TOOL; 10.1 Introduction; 10.2 Feature Extraction Using n-Gram Analysis; 10.2.1 Binary n-Gram Feature; 10.2.2 Feature Collection; 10.2.3 Feature Selection; 10.2.4 Assembly n-Gram Feature; 10.2.5 DLL Function Call Feature; 10.3 The Hybrid Feature Retrieval Model; 10.3.1 Description of the Model; 10.3.2 The Assembly Feature Retrieval (AFR) Algorithm; 10.3.3 Feature Vector Computation and Classification; 10.4 Summary; References; CHAPTER 11: EVALUATION AND RESULTS; 11.1 Introduction; 11.2 Experiments; 11.3 Dataset 11.4 Experimental Setup; 11.5 Results; 11.5.1 Accuracy; 11.5.1.1 Dataset1; 11.5.1.2 Dataset2; 11.5.1.3 Statistical Significance Test; 11.5.1.4 DLL Call Feature; 11.5.2 ROC Curves; 11.5.3 False Positive and False Negative; 11.5.4 Running Time; 11.5.5 Training and Testing with Boosted 11.6 Example Run; 11.7 Summary; References; CONCLUSION TO PART III; PART IV: DATA MINING FOR DETECTING REMOTE EXPLOITS; Introduction to Part IV; CHAPTER 12: DETECTING REMOTE EXPLOITS; 12.1 Introduction; 12.2 Architecture; 12.3 Related Work; 12.4 Overview of Our Approach; 12.5 Summary; References; CHAPTER 13: DESIGN OF THE DATA MINING TOOL; 13.1 Introduction; 13.2 DExtor Architecture; 13.3 Disassembly; 13.4 Feature Extraction; 13.4.1 Useful Instruction Count (UIC); 13.4.2 Instruction Usage Frequencies (IUF); 13.4.3 Code vs. Data Length (CDL); 13.5 Combining Features and Compute Combined Feature Vector; 13.6 Classification; 13.7 Summary; References; CHAPTER 14: EVALUATION AND RESULTS; 14.1 Introduction; 14.2 Dataset; 14.3 Experimental Setup; 14.3.1 Parameter Settings; 14.2.2 Baseline Techniques; 14.4 Results; 14.4.1 Running Time; 14.5 Analysis; 14.6 Robustness and Limitations; 14.6.1 Robustness against Obfuscations; 14.6.2 Limitations; 14.7 Summary; References; CONCLUSION TO PART IV; PART V: DATA MINING FOR DETECTING BOTNETS; Introduction to Part V; CHAPTER 15: DETECTING BOTNETS; 15.1 Introduction; 15.2 Botnet Architecture; 15.3 Related Work; 15.4 Our Approach; 15.5 Summary; References; CHAPTER 16: DESIGN OF THE DATA MINING TOOL; 16.1 Introduction; 16.2 Architecture; 16.3 System Setup; 16.4 Data Collection; 16.5 Bot Command Categorization; 16.6 Feature Extraction; 16.6.1 Packet-Level Features; 16.6.2 Flow-Level Features; 16.7 Log File Correlation; 16.8 Classification; 16.9 Packet Filtering; 16.10 Summary; References; CHAPTER 17: Evaluation and Results; 17.1 Introduction; 17.1.1 Baseline Techniques; 17.1.2 Classifiers; 17.2 Performance on Different Datasets; 17.3 Comparison with Other Techniques; 17.4 Further Analysis; 17.5 Summary; References; CONCLUSION TO PART V; PART VI: STREAM MINING FOR SECURITY APPLICATIONS; Introduction to Part VI; CHAPTER 18: STREAM MINING; 18.1 Introduction; 18.2 Architecture; 18.3 Related Work; 18.4 Our Approach; 18.5 Overview of the Novel Class Detection Algorithm; 18.6 Classifiers Used; 18.7 Security Applications; 18.8 Summary; References; CHAPTER 19: DESIGN OF THE DATA MINING TOOL; 19.1 Introduction; 19.2 Definitions; 19.3 Novel Class Detection; 19.3.1 Saving the Inventory of Used Spaces during Training; 19.3.1.1 Clustering; 19.3.1.2 Storing the Cluster Summary Information; 19.3.2 Outlier Detection and Filtering; 19.3.2.1 Filtering; 19.3.3 Detecting Novel Class; 19.3.3.1 Computing the Set of Novel Class Instances; 19.3.3.2 Speeding up the Computation; 19.3.3.3 Time Complexity; 19.3.3.4 Impact of Evolving Class Labels on Ensemble Classification; 19.4 Security Applications; 19.5 Summary; Reference; CHAPTER 20: EVALUATION AND RESULTS; 20.1 Introduction; 20.2 Datasets; 20.2.1 Synthetic Data with Only Concept-Drift (SynC); 20.2.2 Synthetic Data with Concept-Drift and Novel Class (SynCN); 20.2.3 Real Data—KDD Cup 99 Network Intrusion Detection; 20.2.4 Real Data—Forest Cover (UCI Repository); 20.3 Experimental Setup; 20.3.1 Baseline Method; 20.4 Performance Study; 20.4.1 Evaluation Approach; 20.4.2 Results; 20.4.3 Running Time; 20.5 Summary; References; CONCLUSION TO VI; PART VII: EMERGING APPLICATIONS; Introduction to Part VII; CHAPTER 21: Data Mining for Active Defense; 21.1 Introduction; 21.2 Related Work; 21.3 Architecture; 21.4 A Data Mining-Based Malware Detection Model; 21.4.1 Our Framework; 21.4.2 Feature Extraction; 21.4.2.1 Binary n-Gram Feature Extraction; 21.4.2.2 Feature Selection; 21.4.2.3 Feature Vector Computation; 21.4.3 Training; 21.4.4 Testing; 21.5 Model-Reversing Obfuscations; 21.5.1 Path Selection; 21.5.2 Feature Insertion; 21.5.3 Feature Removal; 21.6 Experiments; 21.7 Summary; References; CHAPTER 22: DATA MINING FOR INSIDER THREAT DETECTION; 22.1 Introduction; 22.2 The Challenges, Related Work, and Our Approach; 22.3 Data Mining for Insider Threat Detection; 22.3.1 Our Solution Architecture; 22.3.2 Feature Extraction and Compact Representation; 22.3.3 RDF Repository Architecture; 26 22.3.4 Data Storage; 22.3.4.1 File Organization; 22.3.4.2 Predicate Split (PS); 22.3.4.3 Predicate Object Split (POS); 22.3.5 Answering Queries Using Hadoop MapReduce; 22.3.6 Data Mining Applications; 22.4 Comprehensive Framework; 22.5 Summary; References; CHAPTER 23: DEPENDABLE REAL-TIME DATA MINING; 23.1 Introduction; 23.2 Issues in Real-Time Data Mining; 23.3 Real-Time Data Mining Techniques; 23.4 Parallel, Distributed, Real-Time Data Mining; 23.5 Dependable Data Mining; 23.6 Mining Data Streams; 23.7 Summary; References; CHAPTER 24: FIREWALL POLICY ANALYSIS; 24.1 Introduction; 24.2 Related Work; 24.3 Firewall Concepts; 24.3.1 Representation of Rules; 24.3.2 Relationship between Two Rules; 24.3.3 Possible Anomalies between Two Rules; 24.4 Anomaly Resolution Algorithms; 24.4.1 Algorithms for Finding and Resolving Anomalies; 24.4.1.1 Illustrative Example; 24.4.2 Algorithms for Merging Rules; 24.4.2.1 Illustrative Example of the Merge Algorithm; 24.5 Summary; References; CONCLUSION TO PART VII; CHAPTER 25: SUMMARY AND DIRECTIONS; 25.1 Introduction; 25.2 Summary of This Book; 25.3 Directions for Data Mining Tools for Malware Detection; 25.4 Where Do We Go from Here?; APPENDIX A: DATA MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS; A.1 Introduction; A.2 Developments in Database Systems; A.3 Status, Vision, and Issues; A.4 Data Management Systems Framework; A.5 Building Information Systems from the Framework; A.6 Relationship between the Texts; A.7 Summary; References; APPENDIX B: TRUSTWORTHY SYSTEMS; B.1 Introduction; B.2 Secure Systems; B.2.1 Introduction; B.2.2 Access Control and Other Security Concepts; B.2.3 Types of Secure Systems; B.2.4 Secure Operating Systems; B.2.5 Secure Database Systems; B.2.6 Secure Networks; B.2.7 Emerging Trends; B.2.8 Impact of the Web; B.2.9 Steps to Building Secure Systems; B.3 Web Security; B.4 Building Trusted Systems from Untrusted Components; B.5 Dependable Systems; B.5.1 Introduction; B.5.2 Trust Management; B.5.3 Digital Rights Management; B.5.4 Privacy; B.5.5 Integrity, Data Quality, and High Assurance; B.6 Other Security Concerns; B.6.1 Risk Analysis; B.6.2 Biometrics, Forensics, and Other Solutions; B.7 Summary; References; APPENDIX C: SECURE DATA, INFORMATION, AND KNOWLEDGE MANAGEMENT; C.1 Introduction; C.2 Secure Data Management; C.2.1 Introduction; C.2.2 Database Management; C.2.2.1 Data Model; C.2.2.2 Functions; C.2.2.3 Data Distribution; C.2.3 Heterogeneous Data Integration; C.2.4 Data Warehousing and Data Mining; C.2.5 Web Data Management; C.2.6 Security Impact; C.3 Secure Information Management; C.3.1 Introduction; C.3.2 Information Retrieval; C.3.3 Multimedia Information Management; C.3.4 Collaboration and Data Management; C.3.5 Digital Libraries; C.3.6 E-Business; C.3.7 Security Impact; C.4 Secure Knowledge Management; C.4.1 Knowledge Management; C.4.2 Security Impact; C.5 Summary; References; APPENDIX D: SEMANTIC WEB; D.1 Introduction; D.2 Layered Technology Stack; D.3 XML; D.3.1 XML Statement and Elements; D.3.2 XML Attributes; D.3.3 XML DTDs; D.3.4 XML Schemas; D.3.5 XML Namespaces; D.3.6 XML Federations/Distribution; D.3.7 XML-QL, XQuery, XPath, XSLT; D.4 RDF; D.4.1 RDF Basics; D.4.2 RDF Container Model; D.4.3 RDF Specification; D.4.4 RDF Schemas; D.4.5 RDF Axiomatic Semantics; D.4.6 RDF Inferencing; D.4.7 RDF Query; D.4.8 SPARQL; D.5 Ontologies; D.6 Web Rules and SWRL; D.6.1 Web Rules; D.6.2 SWRL; D.7 Semantic Web Services; D.8 Summary; References; INDEX.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Shelving location Call number Status Barcode
BOOKs National Law School NAB Compactor 1.6424 MAS (Browse shelf(Opens below)) Available 27573

Contents:
PREFACE;
Introductory Remarks;
Background on Data Mining;
Data Mining for Cyber Security;
Organization of This Book;
Concluding Remarks;
ACKNOWLEDGMENTS;
THE AUTHORS;
COPYRIGHT PERMISSIONS;
CHAPTER 1: INTRODUCTION;
1.1 Trends;
1.2 Data Mining and Security Technologies;
1.3 Data Mining for Email Worm Detection;
1.4 Data Mining for Malicious Code Detection;
1.5 Data Mining for Detecting Remote Exploits;
1.6 Data Mining for Botnet Detection;
1.7 Stream Data Mining;
1.8 Emerging Data Mining Tools for Cyber Security Applications;
1.9 Organization of This Book;
1.10 Next Steps;
PART I: DATA MINING AND SECURITY;
Introduction to Part I: Data Mining and Security;
CHAPTER 2: DATA MINING TECHNIQUES;
2.1 Introduction;
2.2 Overview of Data Mining Tasks and Techniques;
2.3 Artificial Neural Network;
2.4 Support Vector Machines;
2.5 Markov Model;
2.6 Association Rule Mining (ARM);
2.7 Multi-Class Problem;
2.7.1 One-vs-One;
2.7.2 One-vs-All;
2.8 Image Mining;
2.8.1 Feature Selection;
2.8.2 Automatic Image Annotation;
2.8.3 Image Classification;
2.9 Summary References;
CHAPTER 3: MALWARE;
3.1 Introduction;
3.2 Viruses;
3.3 Worms;
3.4 Trojan Horses;
3.5 Time and Logic Bombs;
3.6 Botnet;
3.7 Spyware;
3.8 Summary References;
CHAPTER 4: DATA MINING FOR SECURITY APPLICATIONS;
4.1 Introduction;
4.2 Data Mining for Cyber Security;
4.2.1 Overview;
4.2.2 Cyber-Terrorism, Insider Threats, and External Attacks;
4.2.3 Malicious Intrusions;
4.2.4 Credit Card Fraud and Identity Theft;
4.2.5 Attacks on Critical Infrastructures;
4.2.6 Data Mining for Cyber Security;
4.3 Current Research and Development;
4.4 Summary References;
CHAPTER 5: DESIGN AND IMPLEMENTATION OF DATA MINING TOOLS;
5.1 Introduction;
5.2 Intrusion Detection;
5.3 Web Page Surfing Prediction;
5.4 Image Classification;
5.5 Summary;
References;
CONCLUSION TO PART I;
PART II: DATA MINING FOR EMAIL WORM DETECTION;
Introduction to Part II;
CHAPTER 6: Email Worm Detection;
6.1 Introduction;
6.2 Architecture;
6.3 Related Work;
6.4 Overview of Our Approach;
6.5 Summary;
References;
CHAPTER 7: DESIGN OF THE DATA MINING TOOL;
7.1 Introduction;
7.2 Architecture;
7.3 Feature Description;
7.3.1 Per-Email Features;
7.3.2 Per-Window Features;
7.4 Feature Reduction Techniques;
7.4.1 Dimension Reduction;
7.4.2 Two-Phase Feature Selection (TPS);
7.4.2.1 Phase I;
7.4.2.2 Phase II;
7.5 Classification Techniques;
7.6 Summary;
References;
CHAPTER 8: EVALUATION AND RESULTS;
8.1 Introduction;
8.2 Dataset;
8.3 Experimental Setup;
8.4 Results;
8.4.1 Results from Unreduced Data;
8.4.2 Results from PCA-Reduced Data;
8.4.3 Results from Two-Phase Selection;
8.5 Summary;
References;
CONCLUSION TO PART II;
PART III: DATA MINING FOR DETECTING MALICIOUS EXECUTABLES Introduction to Part III CHAPTER 9: MALICIOUS EXECUTABLES;
9.1 Introduction;
9.2 Architecture;
9.3 Related Work;
9.4 Hybrid Feature Retrieval (HFR) Model;
9.5 Summary;
References;
CHAPTER 10: DESIGN OF THE DATA MINING TOOL;
10.1 Introduction;
10.2 Feature Extraction Using n-Gram Analysis;
10.2.1 Binary n-Gram Feature;
10.2.2 Feature Collection;
10.2.3 Feature Selection;
10.2.4 Assembly n-Gram Feature;
10.2.5 DLL Function Call Feature;
10.3 The Hybrid Feature Retrieval Model;
10.3.1 Description of the Model;
10.3.2 The Assembly Feature Retrieval (AFR) Algorithm;
10.3.3 Feature Vector Computation and Classification;
10.4 Summary;
References;
CHAPTER 11: EVALUATION AND RESULTS;
11.1 Introduction;
11.2 Experiments;
11.3 Dataset
11.4 Experimental Setup;
11.5 Results;
11.5.1 Accuracy;
11.5.1.1 Dataset1;
11.5.1.2 Dataset2;
11.5.1.3 Statistical Significance Test;
11.5.1.4 DLL Call Feature;
11.5.2 ROC Curves;
11.5.3 False Positive and False Negative;
11.5.4 Running Time;
11.5.5 Training and Testing with Boosted
11.6 Example Run;
11.7 Summary;
References;
CONCLUSION TO PART III;
PART IV: DATA MINING FOR DETECTING REMOTE EXPLOITS;
Introduction to Part IV;
CHAPTER 12: DETECTING REMOTE EXPLOITS;
12.1 Introduction;
12.2 Architecture;
12.3 Related Work;
12.4 Overview of Our Approach;
12.5 Summary;
References;
CHAPTER 13: DESIGN OF THE DATA MINING TOOL;
13.1 Introduction;
13.2 DExtor Architecture;
13.3 Disassembly;
13.4 Feature Extraction;
13.4.1 Useful Instruction Count (UIC);
13.4.2 Instruction Usage Frequencies (IUF);
13.4.3 Code vs. Data Length (CDL);
13.5 Combining Features and Compute Combined Feature Vector;
13.6 Classification;
13.7 Summary;
References;
CHAPTER 14: EVALUATION AND RESULTS;
14.1 Introduction;
14.2 Dataset;
14.3 Experimental Setup;
14.3.1 Parameter Settings;
14.2.2 Baseline Techniques;
14.4 Results;
14.4.1 Running Time;
14.5 Analysis;
14.6 Robustness and Limitations;
14.6.1 Robustness against Obfuscations;
14.6.2 Limitations;
14.7 Summary;
References;
CONCLUSION TO PART IV;
PART V: DATA MINING FOR DETECTING BOTNETS;
Introduction to Part V;
CHAPTER 15: DETECTING BOTNETS;
15.1 Introduction;
15.2 Botnet Architecture;
15.3 Related Work;
15.4 Our Approach;
15.5 Summary;
References;
CHAPTER 16: DESIGN OF THE DATA MINING TOOL;
16.1 Introduction;
16.2 Architecture;
16.3 System Setup;
16.4 Data Collection;
16.5 Bot Command Categorization;
16.6 Feature Extraction;
16.6.1 Packet-Level Features;
16.6.2 Flow-Level Features;
16.7 Log File Correlation;
16.8 Classification;
16.9 Packet Filtering;
16.10 Summary;
References;
CHAPTER 17: Evaluation and Results;
17.1 Introduction;
17.1.1 Baseline Techniques;
17.1.2 Classifiers;
17.2 Performance on Different Datasets;
17.3 Comparison with Other Techniques;
17.4 Further Analysis;
17.5 Summary;
References;
CONCLUSION TO PART V;
PART VI: STREAM MINING FOR SECURITY APPLICATIONS;
Introduction to Part VI;
CHAPTER 18: STREAM MINING;
18.1 Introduction;
18.2 Architecture;
18.3 Related Work;
18.4 Our Approach;
18.5 Overview of the Novel Class Detection Algorithm;
18.6 Classifiers Used;
18.7 Security Applications;
18.8 Summary;
References;
CHAPTER 19: DESIGN OF THE DATA MINING TOOL;
19.1 Introduction;
19.2 Definitions;
19.3 Novel Class Detection;
19.3.1 Saving the Inventory of Used Spaces during Training;
19.3.1.1 Clustering;
19.3.1.2 Storing the Cluster Summary Information;
19.3.2 Outlier Detection and Filtering;
19.3.2.1 Filtering;
19.3.3 Detecting Novel Class;
19.3.3.1 Computing the Set of Novel Class Instances;
19.3.3.2 Speeding up the Computation;
19.3.3.3 Time Complexity;
19.3.3.4 Impact of Evolving Class Labels on Ensemble Classification;
19.4 Security Applications;
19.5 Summary;
Reference;
CHAPTER 20: EVALUATION AND RESULTS;
20.1 Introduction;
20.2 Datasets;
20.2.1 Synthetic Data with Only Concept-Drift (SynC);
20.2.2 Synthetic Data with Concept-Drift and Novel Class (SynCN);
20.2.3 Real Data—KDD Cup 99 Network Intrusion Detection;
20.2.4 Real Data—Forest Cover (UCI Repository);
20.3 Experimental Setup;
20.3.1 Baseline Method;
20.4 Performance Study;
20.4.1 Evaluation Approach;
20.4.2 Results;
20.4.3 Running Time;
20.5 Summary;
References;
CONCLUSION TO VI;
PART VII: EMERGING APPLICATIONS;
Introduction to Part VII;
CHAPTER 21: Data Mining for Active Defense;
21.1 Introduction;
21.2 Related Work;
21.3 Architecture;
21.4 A Data Mining-Based Malware Detection Model;
21.4.1 Our Framework;
21.4.2 Feature Extraction;
21.4.2.1 Binary n-Gram Feature Extraction;
21.4.2.2 Feature Selection;
21.4.2.3 Feature Vector Computation;
21.4.3 Training;
21.4.4 Testing;
21.5 Model-Reversing Obfuscations;
21.5.1 Path Selection;
21.5.2 Feature Insertion;
21.5.3 Feature Removal;
21.6 Experiments;
21.7 Summary;
References;
CHAPTER 22: DATA MINING FOR INSIDER THREAT DETECTION;
22.1 Introduction;
22.2 The Challenges, Related Work, and Our Approach;
22.3 Data Mining for Insider Threat Detection;
22.3.1 Our Solution Architecture;
22.3.2 Feature Extraction and Compact Representation;
22.3.3 RDF Repository Architecture;
26 22.3.4 Data Storage;
22.3.4.1 File Organization;
22.3.4.2 Predicate Split (PS);
22.3.4.3 Predicate Object Split (POS);
22.3.5 Answering Queries Using Hadoop MapReduce;
22.3.6 Data Mining Applications;
22.4 Comprehensive Framework;
22.5 Summary;
References;
CHAPTER 23: DEPENDABLE REAL-TIME DATA MINING;
23.1 Introduction;
23.2 Issues in Real-Time Data Mining;
23.3 Real-Time Data Mining Techniques;
23.4 Parallel, Distributed, Real-Time Data Mining;
23.5 Dependable Data Mining;
23.6 Mining Data Streams;
23.7 Summary;
References;
CHAPTER 24: FIREWALL POLICY ANALYSIS;
24.1 Introduction;
24.2 Related Work;
24.3 Firewall Concepts;
24.3.1 Representation of Rules;
24.3.2 Relationship between Two Rules;
24.3.3 Possible Anomalies between Two Rules;
24.4 Anomaly Resolution Algorithms;
24.4.1 Algorithms for Finding and Resolving Anomalies;
24.4.1.1 Illustrative Example;
24.4.2 Algorithms for Merging Rules;
24.4.2.1 Illustrative Example of the Merge Algorithm;
24.5 Summary;
References;
CONCLUSION TO PART VII;
CHAPTER 25: SUMMARY AND DIRECTIONS;
25.1 Introduction;
25.2 Summary of This Book;
25.3 Directions for Data Mining Tools for Malware Detection;
25.4 Where Do We Go from Here?;
APPENDIX A: DATA MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS;
A.1 Introduction;
A.2 Developments in Database Systems;
A.3 Status, Vision, and Issues;
A.4 Data Management Systems Framework;
A.5 Building Information Systems from the Framework;
A.6 Relationship between the Texts;
A.7 Summary;
References;
APPENDIX B: TRUSTWORTHY SYSTEMS;
B.1 Introduction;
B.2 Secure Systems;
B.2.1 Introduction;
B.2.2 Access Control and Other Security Concepts;
B.2.3 Types of Secure Systems;
B.2.4 Secure Operating Systems;
B.2.5 Secure Database Systems;
B.2.6 Secure Networks;
B.2.7 Emerging Trends;
B.2.8 Impact of the Web;
B.2.9 Steps to Building Secure Systems;
B.3 Web Security;
B.4 Building Trusted Systems from Untrusted Components;
B.5 Dependable Systems;
B.5.1 Introduction;
B.5.2 Trust Management;
B.5.3 Digital Rights Management;
B.5.4 Privacy;
B.5.5 Integrity, Data Quality, and High Assurance;
B.6 Other Security Concerns;
B.6.1 Risk Analysis;
B.6.2 Biometrics, Forensics, and Other Solutions;
B.7 Summary;
References;
APPENDIX C: SECURE DATA, INFORMATION, AND KNOWLEDGE MANAGEMENT;
C.1 Introduction;
C.2 Secure Data Management;
C.2.1 Introduction;
C.2.2 Database Management;
C.2.2.1 Data Model;
C.2.2.2 Functions;
C.2.2.3 Data Distribution;
C.2.3 Heterogeneous Data Integration;
C.2.4 Data Warehousing and Data Mining;
C.2.5 Web Data Management;
C.2.6 Security Impact;
C.3 Secure Information Management;
C.3.1 Introduction;
C.3.2 Information Retrieval;
C.3.3 Multimedia Information Management;
C.3.4 Collaboration and Data Management;
C.3.5 Digital Libraries;
C.3.6 E-Business;
C.3.7 Security Impact;
C.4 Secure Knowledge Management;
C.4.1 Knowledge Management;
C.4.2 Security Impact;
C.5 Summary;
References;
APPENDIX D: SEMANTIC WEB;
D.1 Introduction;
D.2 Layered Technology Stack;
D.3 XML;
D.3.1 XML Statement and Elements;
D.3.2 XML Attributes;
D.3.3 XML DTDs;
D.3.4 XML Schemas;
D.3.5 XML Namespaces;
D.3.6 XML Federations/Distribution;
D.3.7 XML-QL, XQuery, XPath, XSLT;
D.4 RDF;
D.4.1 RDF Basics;
D.4.2 RDF Container Model;
D.4.3 RDF Specification;
D.4.4 RDF Schemas;
D.4.5 RDF Axiomatic Semantics;
D.4.6 RDF Inferencing;
D.4.7 RDF Query;
D.4.8 SPARQL;
D.5 Ontologies;
D.6 Web Rules and SWRL;
D.6.1 Web Rules;
D.6.2 SWRL;
D.7 Semantic Web Services;
D.8 Summary;
References;
INDEX.

There are no comments on this title.

to post a comment.