Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.
Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you'll need to know how to think like a data scientist.
In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualization, and shows you how to apply these methods to malware detection and analysis.
You'll learn how to:
- Analyze malware using static analysis
- Observe malware behavior using dynamic analysis
- Identify adversary groups through shared code analysis
- Catch 0-day vulnerabilities by building your own machine learning detector
- Measure malware detector accuracy
- Identify malware campaigns, trends, and relationships through data visualization
Whether you're a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, Malware Data Science will help you stay ahead of the curve.
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.
Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you'll need to know how to think like a data scientist.
In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualization, and shows you how to apply these methods to malware detection and analysis.
You'll learn how to:
- Analyze malware using static analysis
- Observe malware behavior using dynamic analysis
- Identify adversary groups through shared code analysis
- Catch 0-day vulnerabilities by building your own machine learning detector
- Measure malware detector accuracy
- Identify malware campaigns, trends, and relationships through data visualization
Whether you're a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, Malware Data Science will help you stay ahead of the curve.
Malware Data Science: Attack Detection and Attribution
272Malware Data Science: Attack Detection and Attribution
272Paperback
Related collections and offers
Product Details
ISBN-13: | 9781593278595 |
---|---|
Publisher: | No Starch Press San Francisco, CA |
Publication date: | 09/04/2018 |
Pages: | 272 |
Sales rank: | 209,240 |
Product dimensions: | 7.00(w) x 9.25(h) x 0.00(d) |
About the Author
Customer Reviews
Explore More Items
Your own in-house legal advisor—at a fraction of the cost
Written in plain-English for business people without any legal training, Law For Small Business For Dummies covers everything you need
Learn to:
- Score higher on the GMAT and get into the business school of your choice
- Improve your skills to conquer the verbal and quantitative sections
- Write clearly and effectively to ace the
Build a winning portfolio--and reduce your risk--with this bestselling guide
Online investing has never been easier--or more potentially confusing. Now that every broker or finance site has its own
The latest on SQL databases
SQL All -In-One For Dummies, 3rd Edition, is a one-stop shop for everything you need to know about SQL and SQL-based relational databases. Everyone from database
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and
Modern cars are more connected than ever before. Infotainment and navigation systems, diagnostics, WiFi, software assisted steering, and other innovations form a complex network that helps make
Master the
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
A
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware.
With the aid of numerous case studies
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you