rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780387887340

Machine Learning in Cyber Trust

by ;
  • ISBN13:

    9780387887340

  • ISBN10:

    0387887342

  • Format: Hardcover
  • Copyright: 2009-04-17
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $199.99 Save up to $142.75
  • Digital
    $124.02*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Table of Contents

Prefacep. vii
Cyber Systemp. 1
Cyber-Physical Systems: A New Frontierp. 3
Introductionp. 3
The Challenges of Cyber-Physical System Researchp. 6
Real-time System Abstractionsp. 7
Robustness of Cyber-Physical Systemsp. 8
System QoS Composition Challengep. 10
Knowledge Engineering in Cyber-Physical Systemsp. 10
Medical Device Network: An Example Cyber-Physical Systemp. 11
Summaryp. 12
Referencesp. 13
Securityp. 15
Misleading Learners: Co-opting Your Spam Filterp. 17
Introductionp. 17
Backgroundp. 19
Training Modelp. 20
The Contamination Assumptionp. 21
SpamBayes Learning Methodp. 21
Attacksp. 23
Causative Availability Attacksp. 25
Causative Integrity Attacks-Pseudospamp. 28
Experimentsp. 29
Experimental Methodp. 29
Dictionary Attack Resultsp. 33
Focused Attack Resultsp. 36
Pseudospam Attack Experimentsp. 40
A Defense: Reject on Negative Impact (RONI)p. 43
Related Workp. 45
Conclusionp. 46
Appendix: Analysis of an Optimal Attackp. 46
Properties of the Spam Scorep. 47
Effect of Poisoning on Token Scoresp. 48
Referencesp. 50
Survey of Machine Learning Methods for Database Securityp. 53
Introductionp. 53
Paper Road Mapp. 56
Detection of SQL Injection Attacksp. 56
A Learning-based Approach to the Detection of SQL Attacksp. 57
Profiling Database Applications to Detect SQL Injection Attacksp. 59
Anomaly Detection for Defending Against Insider Threatsp. 60
DEMIDS: A Misuse Detection System for Database Systemsp. 60
A Data Mining Approach for Database Intrusion Detectionp. 61
Detecting Anomalous Database Access Patterns in Relational Databasesp. 62
Emerging Trendsp. 67
Database Activity Monitoringp. 67
Responding to Database Anomaliesp. 68
Conclusionp. 69
Referencesp. 70
Identifying Threats Using Graph-based Anomaly Detectionp. 73
Introductionp. 73
Graph-based Learningp. 75
Graph-based Anomaly Detectionp. 76
GBAD Approachp. 78
Experimental Resultsp. 81
Synthetic Datap. 82
Real-world Datasetsp. 87
Other Domainsp. 103
Related Workp. 104
Conclusionsp. 106
Referencesp. 107
On the Performance of Online Learning Methods for Detecting Malicious Executablesp. 109
Introductionp. 109
Preliminariesp. 111
Machine Learningp. 111
Evaluationp. 113
Detecting Malicious Executablesp. 114
Online Learning Methodsp. 115
Naive Bayesp. 116
Staggerp. 116
Winnowp. 117
Hoeffding Treep. 118
Streaming Ensemble Algorithmp. 118
Accuracy Weighted Ensemblep. 119
Dynamic Weighted Majorityp. 119
From Executables to Examplesp. 120
Experimental Studyp. 121
Designp. 121
Results and Analysisp. 122
Discussionp. 128
Concluding Remarksp. 129
Referencesp. 130
Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systemsp. 133
Introductionp. 133
Existing Workp. 136
The Proposed Network Intrusion Detection Frameworkp. 137
C-RSPM Supervised Classificationp. 139
Temporal Pattern Analysis using LDMp. 140
Experimental Setupp. 145
Experimental Resultsp. 147
Performance of C-RSPMp. 147
Performance of LDMp. 148
Performance of the Proposed Frameworkp. 151
Conclusionp. 152
Referencep. 152
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Featuresp. 155
Introductionp. 156
Related workp. 159
Event-Based Non-intrusive Approach for Enhancing Legacy Systems with Self-Protection Featuresp. 160
Motivating Examplep. 161
Control-loop architecturep. 162
Observation Modulep. 164
Evaluation Modulep. 165
Protection Modulep. 166
Observation and Inferencep. 167
Making Decisions in Real-Timep. 170
Truthful Votersp. 172
Untruthful Votersp. 174
Current Implementationp. 177
Event and channelsp. 177
Modulesp. 177
Conclusionp. 179
Referencesp. 180
Image Encryption and Chaotic Cellular Neural Networkp. 183
Introduction to image encryptionp. 183
Based on image scrambling techniquep. 184
Based on SCAN patternp. 185
Based on tree data structuresp. 185
Based on chaotic systemsp. 186
Image encryption scheme based on chaotic CNNp. 188
Introduction to Cellular Neural Networkp. 188
Description of image encryption algorithamp. 195
Security analysesp. 199
Key space analysisp. 199
Sensitivity analysisp. 199
Information entropyp. 202
Statistical analysisp. 203
Comparisons with other chaos-based algorithmsp. 208
Conclusions and discussionp. 209
Referencesp. 210
Privacyp. 215
From Data Privacy to Location Privacyp. 217
Introductionp. 217
Data Privacyp. 219
Models and Principlesp. 220
Techniquesp. 225
Location Privacyp. 231
Models and Principlesp. 232
Location Anonymization Techniquesp. 237
Open Issues and Challengesp. 241
Summaryp. 243
Referencesp. 244
Privacy Preserving Nearest Neighbor Searchp. 247
Introductionp. 247
Overviewp. 249
Problem Descriptionp. 249
Definitionsp. 250
Secure Multiparty Computation Primitivesp. 251
Provable Securityp. 253
Nearest Neighbor Algorithmp. 253
Nearest Neighbor Searchp. 253
Find Furthest Pointsp. 258
Extension to the Multiparty Casep. 261
Applicationsp. 261
LOF Outlier Detectionp. 261
SNN Clusteringp. 264
kNN Classificationp. 265
Complexity Analysisp. 268
Optimizationsp. 270
Related Workp. 271
Conclusionp. 273
Referencesp. 274
Reliabilityp. 277
High-Confidence Compositional Reliability Assessment of SOA-Based Systems Using Machine Learning Techniquesp. 279
Introductionp. 279
Related Workp. 282
Reliability assessment of Service from Service Layer Perspectivep. 283
Reliability assessment of Composite Service from Service Layer Perspectivep. 284
Reliability assessment of Services from Component Layer Perspectivep. 285
Service Reliability Assessment Frameworkp. 287
Component Reliability Assessment Frameworkp. 288
System Reliabilityp. 302
Experimental Studiesp. 311
Features of the ECM Applicationp. 311
Dynamic Reliability Monitoringp. 312
Storing the Testing and Dynamically Monitored Datap. 313
Dynamic Monitoring for a Specific Service Invocationp. 313
Conclusionsp. 319
Referencesp. 320
Model, Properties, and Applications of Context-Aware Web Servicesp. 323
Introductionp. 323
Related researchp. 326
Web Services and semantic Webp. 326
Context and context-aware applicationsp. 328
Context modelp. 329
Context descriptionp. 330
Context acquisitionp. 333
System implementationp. 336
Context-aware applicationsp. 339
Context-aware services discovery for finding right servicesp. 339
Context-aware social collaborators discovery for finding right partnersp. 344
Context-aware content adaptation for finding right content presentationp. 350
Conclusionsp. 355
Referencesp. 356
Indexp. 359
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program