Malware Analysis Using Artificial Intelligence and Deep Learning -

Malware Analysis Using Artificial Intelligence and Deep Learning

Buch | Hardcover
XX, 651 Seiten
2020 | 1st ed. 2021
Springer International Publishing (Verlag)
978-3-030-62581-8 (ISBN)
192,59 inkl. MwSt

This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed.


This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.

Mark Stamp has extensive experience in information security and machine learning, having worked in these fields within academic, industrial, and government environments. After completing his PhD research in cryptography at Texas Tech University, he spent more than seven years as a cryptanalyst with the United States National Security Agency (NSA), followed by two years developing a digital rights management product for a Silicon Valley start-up company. Since 2002, Dr. Stamp has been a Professor in the Department of Computer Science at San Jose State University, where he teaches courses in machine learning and information security. To date, he has published more than 140 research papers, most of which deal with problems at the interface between machine learning and information security. Dr. Stamp served as co-editor of the Handbook of Information and Communication Security (Springer, 2010), and he is the author of four books, including a popular information security textbook (Information Security: Principles and Practice, 2nd edition, Wiley, 2011) and, most recently, a machine learning textbook (Introduction to Machine Learning with Applications in Information Security, Chapman and Hall/CRC, 2017). Mamoun Alazab received his PhD degree in Computer Science from the Federation University of Australia, School of Science, Information Technology and Engineering. He is currently an Associate Professor in the College of Engineering, IT and Environment at Charles Darwin University, Australia. He is a cyber-security researcher and practitioner with industry and academic experience. Dr. Alazab's research is multidisciplinary, with a focus on cyber security and digital forensics of computer systems, including current and emerging issues in the cyber environment, such as cyber-physical systems and the Internet of Things. His research takes into consideration the unique challenges present in these environments, with an emphasis on cybercrime detection and prevention. He has a particular interest in the application of machine learning as an essential tool for cybersecurity, examples of which include detecting attacks, analyzing malicious code, and uncovering vulnerabilities in software. He is the Founder and the Chair of the IEEE Northern Territory Subsection (February 2019 - present), a Senior Member of the IEEE, Cybersecurity Academic Ambassador for Oman's Information Technology Authority (ITA), and Member of the IEEE Computer Society's Technical Committee on Security and Privacy (TCSP). In addition, he has collaborated with government and industry on many projects, including work with IBM, Trend Micro, Westpac, the Australian Federal Police (AFP), the Australian Communications and Media Authority (ACMA), Westpac, UNODC to name a few. Andrii Shalaginov is a Researcher in Information Security and Digital Forensics at the Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, Norwegian University of Science and Technology (NTNU). Dr. Shalaginov was awarded the PhD degree in Information Security from NTNU in February 2018. During the last decade, Dr. Shalaginov's focus has been on the fields of cybercrime investigation and intelligent malware detection. His primary expertise is in static and dynamic malware analysis, development of machine learning-aided intelligent computer virus detection models, and similarity-based categorization of cyberattacks in the Internet of Things. Further, Dr. Shalaginov has worked as a security researcher for UNICRI/EUIPO on malware analysis for copyright-infringing websites. He was nominated as a representative from Norway at COST Action CA17124 "DigForAsp - Digital forensics: evidence analysis via intelligent systems and practices". In 2018, Dr. Shalaginov, together with his NTNU team, received an award for first place in the "Future of Smart Policing" hackathon competition sponsored by INTERPOL (Singapore). Dr. Shalaginov also holds a second Master's Degree in Information Security (Digital Forensics) from Gjovik University College (GUC), and he received BSc and MSc degrees in System Designing from the National Technical University of Ukraine "Kyiv Polytechnic Institute", Department of Computer-Aided Design. Finally, Dr. Shalaginov is LE-1/LPIC-1 certified and has extensive industry experience, including work at Samsung R&D Center.

1. Optimizing Multi-class Classification of Binaries Based on Static Features.- 2.Detecting Abusive Comments Using Ensemble Deep Learning Algorithms.- 3. Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS.- 4. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges.- 5. A Selective Survey of Deep Learning Techniques and Their Application to Malware Analysis.- 6. A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification.- 7. Word Embedding Techniques for Malware Evolution Detection.- 8. Reanimating Historic Malware Samples.- 9. DURLD: Malicious URL detection using Deep learning based Character-level representations.- 10. Sentiment Analysis for Troll Detection on Weibo.- 11. Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families.- 12. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs.- 13. An Empirical Analysis of Image-Based Learning Techniques for Malware Classification.- 14. A Survey of Intelligent Techniques for Android Malware Detection.- 15. Malware Detection with Sequence-Based Machine Learning and Deep Learning.- 16. A Novel Study on Multinomial Classification of x86/x64 Linux ELF Malware Types and Families through Deep Neural Networks.- 17. Cluster Analysis of Malware Family Relationships.- 18. Log-Based Malicious Activity Detection using Machine and Deep Learning.- 19. Deep Learning in Malware Identification and Classification.- 20. Image Spam Classification with Deep Neural Networks.- 21. Fast and Straightforward Feature Selection Method.- 22. On Ensemble Learning.- 23. A Comparative Study of Adversarial Attacks to Malware Detectors Based on Deep Learning.- 24. Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability.- 25. Universal Adversarial Perturbations and Image Spam Classifiers.


Erscheinungsdatum
Zusatzinfo XX, 651 p. 253 illus., 209 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 1162 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Schlagworte Artificial Intelligence • Computer forensics • cybercrime • Deep learning • Intrusion Detection • machine learning • Malware identification and analysis • Neural networks • phishing detection • spam detection
ISBN-10 3-030-62581-8 / 3030625818
ISBN-13 978-3-030-62581-8 / 9783030625818
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99