Browse Subject Headings
Data Exfiltration Threats and Prevention Techniques : Machine Learning and Memory-Based Data Security
Data Exfiltration Threats and Prevention Techniques : Machine Learning and Memory-Based Data Security
Click to enlarge
Author(s): Sohrabi, Nasrin
Suaboot, Jakapan
Tari, Zahir
ISBN No.: 9781119898870
Pages: 288
Year: 202306
Format: Trade Cloth (Hard Cover)
Price: $ 186.30
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Acknowledgments ix Acronyms xi 1 Introduction 5 1.1 Data Exfiltration Methods . 9 1.2 Important Questions . 14 1.3 Book Scope . 18 1.4 Book Summary .


20 1.5 Book Structure . 27 2 Background 29 2.1 Hidden Markov Model . 29 2.2 Memory Forensics . 37 2.3 Bag-of-Words Model .


42 2.4 Sparse Distributed Representation . 43 2.5 Summary . 45 3 Data Security Threats 47 3.1 Data Security . 48 3.2 Security vs.


Protection vs. Privacy . 53 3.3 Advanced Persistent Threats Attacks . 54 v 3.4 Cybersecurity Threats . 58 3.5 Conclusion .


89 4 Use Cases Data Leakage Attacks 91 4.1 Most Significant Attacks . 91 4.2 Top Infection Vectors . 98 4.3 Top Threats of Recent Years . 101 4.4 Malware Development Trends .


103 4.5 Geographic Trends . 108 4.6 Industry Trends . 114 4.7 Conclusion . 116 5 Survey on Building Block Technologies 117 5.1 Motivation .


118 5.2 Background . 123 5.3 Taxonomy . 137 5.4 Supervised Learning Methods . 140 5.5 Systematic Literature Review .


155 5.6 Evaluation of Supervised Learning Methods . 156 5.7 Key Open Problems . 175 5.8 Summary . 178 6 Behavior-based Data Exfiltration Detection 179 6.1 Motivation .


180 6.2 Existing Methods . 183 vi 6.3 Sub-Curve HMM Method . 190 6.4 Evaluation . 206 6.5 Experimental Results .


214 6.6 Discussion . 223 6.7 Summary . 227 7 Memory-based Data Exfiltration Detection 229 7.1 Motivation . 230 7.2 Existing Methods .


233 7.3 Concepts . 237 7.4 Fast lookup Bag-of-Words (FBoW) . 244 7.5 Evaluation . 256 7.6 Summary .


278 8 Temporal-based Data Exfiltration Detection 281 8.1 Motivation . 281 8.2 Existing Methods . 285 8.3 Definitions . 287 8.4 Temporary Memory Bag-of-Words (TMBoW) .


293 8.5 Experimental Results . 301 8.6 Summary . 314 9 Conclusion 317.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings