Intelligent Security Systems

Intelligent Security Systems
Автор книги: id книги: 2165955     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 10697,3 руб.     (101,82$) Читать книгу Купить и скачать книгу Электронная книга Жанр: Программы Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119771562 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

INTELLIGENT SECURITY SYSTEMS Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device’s owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities. This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. Intelligent Security Systems includes supplementary resources on an author-hosted website, such as classroom presentation slides, sample review, test and exam questions, and practice exercises to make the material contained practical and useful. The book also offers: A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends Perfect for undergraduate and graduate students in computer security, computer science and engineering, Intelligent Security Systems will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields.

Оглавление

Leon Reznik. Intelligent Security Systems

Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Intelligent Security Systems. How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security

Acknowledgments

Introduction. I.1 Who Is This Book For?

I.2 What Is This Book About?

I.3 What Is This Book Not About?

I.4 Book Organization and Navigation

I.5 Glossary of Basic Terms

I.6 The Cited NIST Publications

I.7 Data and Information Sources Used. I.7.1 Glossaries in the Area of Cybersecurity

I.7.2 Glossaries in the Area of Artificial Intelligence

I.7.3 Other Data and Information Sources Used. I.7.3.1 Antimalware Tools List and Comparison

1 Computer Security with Artificial Intelligence, Machine Learning, and Data Science Combination: What? How? Why? And Why Now and Together? 1.1 The Current Security Landscape

1.2 Computer Security Basic Concepts

1.3 Sources of Security Threats

1.4 Attacks Against IoT and Wireless Sensor Networks

1.4.1 Preliminary and Simple Attacks

1.4.2 Active Attacks

1.5 Introduction into Artificial Intelligence, Machine Learning, and Data Science. 1.5.1 Why Is AI Needed in Computer Security?

1.5.2 Artificial Intelligence – A Brief Introduction

1.5.3 Difference Between AI, ML, and DS

1.5.4 AI Techniques

1.5.5 Rules Based and ES

Example 1.6 Fuzzy Expert System for Security Evaluation

Example 1.7 The Content Table of the Security Evaluation System Knowledge Base – From Reznik and St. Jacques (2007)

Code 1.1 Example of Input Variables Description in an XML‐Based Language

Code 1.2 Rule Hierarchy Example in an XML‐Based Language

1.6 Fuzzy Logic and Systems

Example 1.8 Neuro‐Fuzzy Hybrid System (Negnevitsky and Kelareva 2001)

1.7 Machine Learning. 1.7.1 ML Algorithms Introduction

Algorithm 1.1 Supervised Learning Approach

Algorithm 1.2 Unsupervised Learning Approach

1.7.2 ML Classification for Cybersecurity

1.7.2.1 ML Algorithms Classification

1.8 Artificial Neural Networks (ANN)

1.8.1 What Is an ANN?

1.8.2 ANN Architecture

1.8.3 ANN Classification

1.8.3.1 Supervised Learning Topologies

1.8.3.2 Unsupervised Learning Topologies

1.9 Genetic Algorithms (GA)

Algorithm 1.3 Generic Genetic Algorithm Procedure

1.10 Hybrid Intelligent Systems

Review Questions

Exercises

References

2 Firewall Design and Implementation: How to Configure Knowledge for the First Line of Defense? 2.1 Firewall Definition, History, and Functions: What Is It? And Where Does It Come From?

2.1.1 Firewall Functions

2.2 Firewall Operational Models or How Do They Work?

2.3 Basic Firewall Architectures or How Are They Built Up?

2.3.1 Screening Router

2.3.2 Dual‐homed Gateway

2.3.3 Screened Host Gateway

2.3.4 Screened Subnet Architecture

2.4 Process of Firewall Design, Implementation, and Maintenance or What Is the Right Way to Put All Things Together?

2.4.1 Planning

2.4.2 Configuration

2.4.2.1 Installation of Hardware and Software

2.4.2.2 Security Policy Rules Configuration

2.4.2.3 Logging and Alerts Configuration

2.4.3 Testing

2.4.4 Deployment

2.4.5 Management

2.5 Firewall Policy Formalization with Rules or How Is the Knowledge Presented?

2.5.1 Rules Presentation

2.5.2 Policy Rule Types. 2.5.2.1 Packet Header Policy Rules

2.5.2.2 Application‐based Policy Rules

2.5.3 Firewall Rules Samples

2.5.3.1 Firewall 1 Rulesets

2.5.3.2 Firewall 2 Rulesets

2.5.3.3 Firewall 3 Rulesets

2.5.3.4 Firewall 4 Rulesets

2.5.3.5 Firewall 5 Rulesets

2.5.3.6 Firewall 6 Rulesets

2.5.3.7 Firewall 7 Rulesets

2.5.4 Firewall Rulesets Composition

2.5.4.1 Generation of Firewall Rules

2.5.4.2 Rules Composition Optimization

2.6 Firewalls Evaluation and Current Developments or How Are They Getting More and More Intelligent?

2.6.1 Firewall Evaluation

2.6.2 Making Firewalls Robust with Fuzzy Logic

2.6.3 Dynamic Firewall Updating with Machine Learning

2.6.4 Next‐generation Firewalls

Review Questions

Exercises

References

3 Intrusion Detection Systems: What Do They Do Beyond the First Line of Defense?

3.1 Definition, Goals, and Primary Functions

3.2 IDS from a Historical Perspective

3.2.1 Conceptualization and Early Years (1980–Mid‐1990s)

3.2.2 Commercialization of IDS (Mid‐1990s–2005)

3.2.3 Proliferation of Intrusion Detection and Prevention Systems (2006–2015)

3.2.4 AI and ML in IDS Design (2016–)

Example 3.1 McAfee HIPS

3.3 Typical IDS Architecture Topologies, Components, and Operational Ranges

3.4 IDS Types: Classification Approaches. 3.4.1 IDS Classification Scheme

3.4.2 Time Layer Classification

3.4.3 Classification Layer: Intrusion Detection Techniques

3.4.3.1 Misuse (aka Signature‐based) Detection

3.4.3.1.1 Conventional Signature Detection Techniques

Algorithm 3.1 Excaustive (brute force) search of a string pattern – pseudocode

Algorithm 3.2 Knuth et al. (1977) – pseodocode

Algorithm 3.3 Rabin and Karp (1987)

Algorithm 3.4 Boyer and Moore (1977)

3.4.3.2 Anomaly Based Intrusion Detection

3.4.3.2.1 Anomaly Based IDS Operation Based on Network Characteristic Patterns

3.4.3.2.2 Anomaly IDS Operation Based on User Profiles

3.4.3.3 Misuse Versus Anomaly IDS Comparison

3.4.3.4 Stateful Protocol‐based Detection

3.4.4 Hybrid Intrusion Detection

3.5 IDS Performance Evaluation

Reliability and Survivability

Information Presented to an Analyst

Severity and Potential Damage

Scalability and Interoperability

Configurability

3.6 Artificial Intelligence and Machine Learning Techniques in IDS Design. 3.6.1 Intelligent Techniques Used in IDS Design and Their Characteristics

Example 3.2 Rule‐based IDS (Agarwal and Joshi 2000) and (Levin 2000)

3.6.2 IDS Design Based on k‐means Algorithm

3.6.3 IDS Design Based on k‐Nearest Neighbor Algorithm

3.6.4 IDS Design Based on Genetic Algorithms

3.6.5 Artificial Neural Network Structures and Their Choice for Intrusion Detection. 3.6.5.1 Shallow ANN Topologies and Their Ensembles

3.6.5.2 Experimental Setup and Datasets1

Example 3.3 Dataset preparation for an IDS design and evaluation (Novikov et al. 2006a,b)

3.6.5.3 Separate ANN Agent Recognition Accuracy: MLP versus RBF Topologies Comparison (Novikov et al. 2006a,b)

3.6.5.4 Neural Network Optimization with GA by the Connectivity Space Reduction

3.6.5.4.1 Genetic Algorithm Composition and Parameters Selection

3.6.5.4.2 ANN Architecture Optimized with GA

3.6.5.5 IDS Design with Multiple Intelligent Heterogeneous Agents

3.7 Intrusion Detection Challenges and Their Mitigation in IDS Design and Deployment

3.7.1 Data Fluctuations

3.7.2 Attack Changes and Modifications

3.7.3 Delay Between a New Attack Signature Identification and Database Upgrading

3.7.4 Neglecting the Alarms

3.7.5 Software Bugs and Vulnerabilities

3.7.6 Overreliance on IDS and Relaxing Other Security Mechanisms

3.7.7 Encrypted Traffic and Other Data

3.7.8 Inaccurate Data

3.7.9 Attacks Against IDS Themselves

3.7.10 Human Intervention and High Experience is Required in IDS Maintenance

3.7.11 Lack of Resources for Big Data Analytics

3.7.12 IDS Deployment Advance Planning

3.7.13 Sensor to Manager Ratio

3.7.14 False Positive and False Negative Rates

3.7.15 Monitoring Traffic in Large Networks

3.8 Intrusion Detection Tools

3.8.1 SNORT

3.8.1.1 Features and Characteristics

3.8.1.2 Types of Operational Modes in SNORT. Packet Sniffer Mode

Packet Logger Mode

Intrusion Detection Mode

3.8.1.3 Limitations. Information Overload

Speed

Performance in Large Networks

3.8.1.4 Installation

3.8.1.5 Configuration

3.8.1.6 SNORT Rules

3.8.2 Other IDS Tools

3.8.3 Host‐based IDS Tools and Systems

Review Questions

Exercises

References

Note

4 Malware and Vulnerabilities Detection and Protection: What Are We Looking for and How? 4.1 Malware Definition, History, and Trends in Development

Example 4.1 Merry Christma: An Early Network Worm (Capek et al. 2003)

Example 4.2 The First Major Malware Internet Attack – Morris Worm

4.2 Malware Classification. 4.2.1 Malware Types

4.2.2 Viruses. 4.2.2.1 Virus Classification

4.2.2.2 File Infector Viruses

Example 4.3 Jerusalem Virus

Code 4.1 Code Snippet of a Jerusalem Virus

4.2.2.3 Boot Sector Viruses

Example 4.4 Stoned Virus Family

4.2.2.4 Multipartite Viruses

4.2.2.5 Macro Viruses and Worms

Example 4.5 Melissa virus – see (FBI News)

Code 4.2 Melissa Virus Code

4.2.2.6 Stealth Viruses

4.2.2.7 Polymorphic Viruses and Worms. Example 4.6 Frodo Virus

4.2.2.8 Metamorphic Viruses and Worms

Example 4.7 Stuxnet Malicious Program

4.2.3 Worms

Example 4.8 Conficker Worm – see Lawton (2009)

4.2.4 Trojan Horses (aka Trojans)

4.2.4.1 Software Trojans

Example 4.9 Zeus Trojan Horse

4.2.4.2 Hardware Trojans

4.2.5 Spyware

Example 4.10 CoolWebSearch

4.2.6 Adware

Example 4.11 Hiddad Hidden Adware (Sophos 2020 Threat Report by the SophosLabs Research Team)

4.2.7 Ransomware

Example 4.12 Petya Ransomware

Code 4.3 Petya.A Technical Details

Example 4.13 Ransomware Activity Targeting the Healthcare and Public Health Sector (Alert (AA20‐302A) 2020)

4.2.8 Rootkits

Example 4.14 XCP Rootkit

4.2.9 Botnets

Example 4.15 Mirai Botnet

Example 4.16 Koobface Botnet

Code 4.4 Mirai Botnet Instructions

4.3 Spam

4.3.1 Spam and Malicious Email

4.4 Software Vulnerabilities

Example 4.17 Heartbleed Vulnerability

Example 4.18 Cross‐Site Request Forgery (Calzavara et al. 2020)

4.5 Principles of Malware Detection and Anti‐malware Protection. 4.5.1 Ways of Malware Infection and Spread

4.5.2 Malware Detection Techniques

4.5.2.1 Signature‐Based Scanning

4.5.2.2 Heuristic‐Based Scanning

4.5.2.3 Behavioral‐Based Analysis

4.5.2.4 Integrity Checking

4.5.2.5 Cloud‐Based Detection

4.5.3 Content Analysis Techniques for Malware Prevention. 4.5.3.1 Content Filtering

4.5.3.2 Content Blocking

Example 4.19 Fortinet Web Content Management Tools

4.5.4 Anti‐spam Technologies and Techniques

4.6 Malware Detection Algorithms. 4.6.1 Conventional Signature Scanning Techniques

Example 4.20 Aho–Corasick Algorithm

Code 4.5 Aho–Corasick Algorithm (Aho‐Corasic 2020)

4.6.2 Machine Learning Techniques for Signature Match and Anomaly Detection

Example 4.21 Malware Detection Framework with Ensemble of Base Learners (Zhu et al. 2020)

4.6.3 Behavioral Analysis with Artificial Neural Networks

Example 4.22 Change Detection with Artificial Neural Networks

4.7 Anti‐malware Tools

4.7.1 Anti‐spam Tools

Review Questions

Exercises

References

5 Hackers versus Normal Users: Who Is Our Enemy and How to Differentiate Them from Us?

5.1 Hacker’s Activities and Protection Against

5.1.1 Definition or Who Is a Hacker?

5.1.2 History and Philosophy of Hackers

Example 5.1 Blue Box to Hijack Telephone Lines

5.1.3 Hacker’s Classification

5.1.4 Hacker’s Motives

5.1.5 Typical Hacker Activities

Example 5.2 SolarWinds Orion Supply Chain Compromise (March 2020 to January 2021) from Alert (AA20‐352A)

5.1.5.1 Phases of Hacking Attacks

5.1.5.2 Hacking Techniques

Example 5.3 Phishing Attacks

5.1.5.3 Typical Hacking Attacks

Example 5.4 The AWS DDoS Attack in 2020

Example 5.5 Exploitation of eBay’s Stored XSS Vulnerabilities

Example 5.6 OceanLotus Watering Hole Attack – from Cyware

Example 5.7 Spoofing Attacks

5.1.6 Hacking Tools

5.1.7 Anti‐hacking Protection

5.1.8 Use Design Case: Recurrent Neural Networks for Colluded Applications Attack Detection in Android OS Devices. 5.1.8.1 Colluded Applications Attack Model

5.1.8.2 Colluded Applications Attack Formalized Description

5.1.8.3 Data Collection and Preprocessing for an Attack Classifier Design. Data Collection

Data Preprocessing

5.1.8.4 Recurrent Neural Networks Models, Their Implementation and Performance Evaluation

5.2 Data Science Investigation of Ordinary Users’ Practice

5.2.1 How Secure Is a Computer Practice of a General Public?

5.2.2 Data Analysis. 5.2.2.1 Respondent Demographics

5.2.2.2 Occupation Practices and Personal History

5.2.3 Security Practice Analysis

5.2.4 Analysis Observations. 5.2.4.1 Firewall Usage

5.2.4.2 Antimalware Usage

5.2.4.3 Password Reuse

5.2.4.4 Password Usage

5.2.4.5 Filesharing Usage

5.2.4.6 Malware Infection

5.2.4.7 Account Management

5.2.5 Mobile Device Security Evaluation with Explicit Fuzzy Rules. 5.2.5.1 Mobile Device Security Evaluation Design

5.2.5.2 Analysis of Installed Applications

5.2.5.3 Analysis of Device Features

5.3 User’s Authentication

5.3.1 What Is a Good Authentication?

5.3.2 Types of Authentication

5.3.2.1 Authentication Methods

5.3.2.2 Authentication Protocols

Comparison Based on Attack Vulnerability

5.3.2.3 Multiple‐factor Authentication. Security Image/Caption

Knowledge‐based Security Questions

One‐time Pass\Verification Code

Effectiveness of Multifactor Authentication Against Attacks

5.3.3 Continuous Authentication

5.3.4 Continuous Authentication with Keyboard Typing Biometrics: Problems and Solutions

5.3.5 Keyboard Continuous Authentication System Design Use Case. 5.3.5.1 Authentication Design Principles

5.3.5.2 System Structure and Functional Organization

5.3.5.3 Authentication System Implementation

Code 5.1 Key Time Calculation

5.3.5.4 Feature Extraction and Classification Techniques

Method 1 Unweighted Nearest Neighbor

Method 2 Weighted Nearest Neighbor Classification Using Relative Key Press Timings

5.4 User’s Anonymity, Attacks Against It, and Protection

5.4.1 TOR

5.4.2 Web Fingerprinting Attack

5.4.2.1 WF Attacks Using Handcrafted Features

Example 5.8 Deep Fingerprinting (DF) Attack Model (Sirinam 2019) with CNN

5.4.3 Defense Against the WF Attacks

Review Questions

Exercises

References

Note

6 Adversarial Machine Learning: Who Is Machine Learning Working For? 6.1 Adversarial Machine Learning Definition

6.2 Adversarial Attack Taxonomy

6.3 Defense Strategies. 6.3.1 Countermeasures in the Training Phase

6.3.2 Countermeasures in the Execution/Testing Phase

6.4 Investigation of the Adversarial Attacks Influence on the Classifier Performance Use Case. 6.4.1 Data Corruption by the Poisoning Attacks

6.4.2 Data Restoration Procedures

Algorithm 6.1 Replacement of Corrupt Data by Mean Substitution

Algorithm 6.2 Replacement of Corrupt Data by Median Substitution

6.4.3 Classifier Performance Change with Corrupted and Restored Data

6.5 Generative Adversarial Networks. 6.5.1 GAN Composition

6.5.2 Unsupervised Learning with GANs

Example 6.1 GAN‐based Attack of Replacing Sign Images

Algorithm 6.3 Autonomous Vehicle Control Model Learning Algorithm

Review Questions

Exercises

References

Index. a

b

c

d

e

f

g

h

i

k

l

m

n

o

p

q

r

s

t

u

v

w

z

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

IEEE Press 445 Hoes Lane Piscataway, NJ 08854

.....

NIST SP 800‐12 An Introduction to Information Security, June 2017, available free of charge from: https://doi.org/10.6028/NIST.SP.800‐12r1

NIST SP 800‐30 Guide for Conducting Risk Assessments NIST, Sep. 2012, available at https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800‐30r1.pdf

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Intelligent Security Systems
Подняться наверх