000 a
999 _c33389
_d33389
008 241114b xxu||||| |||| 00| 0 eng d
020 _a9783031282584
082 _a005.8
_bBER
100 _aBertino, Elisa
245 _aMachine learning techniques for cybersecurity
260 _bSpringer,
_c2023
_aCham :
300 _axii, 165 p. ;
_bill.,
_c25 cm.
365 _b2969.00
_c
_d01
490 _aSynthesis lectures on information security, privacy, and trust
504 _aIncludes bibliographical references.
520 _aThis book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks
650 _aComputer security
650 _aAccess control policies
650 _aAutoencoders
650 _aAnomaly detection
650 _aCode coverage
650 _aControl Flow Graph
650 _aFirewall
650 _aHyperparameters
650 _aMalware detection
650 _aML techniques
650 _aNetwork Security Policies
650 _aRandom Forest
650 _aRansomware
650 _aReinforcement learning
650 _aStatic analysis
650 _aZero-day attacks
700 _aBhardwaj, Sonam
700 _aCicala, Fabrizio
700 _aGong, Sishuai
700 _aKarim, Imtiaz
700 _aKatsis, Charalampos
700 _aLee, Hyunwoo
700 _aLi, Adrian Shuai
700 _aMahgoub, Ashraf Y
942 _2ddc
_cBK