Big data analytics with applications in insider threat detection

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to...

Full description

Bibliographic Details
Main Authors: Thuraisingham, Bhavani M., Masud, Mehedy (Author), Parveen, Pallabi (Author), Khan, Latifur (Author)
Format: eBook
Language:English
Published: Boca Raton, FL CRC Press 2018
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 05416nmm a2200589 u 4500
001 EB001911255
003 EBX01000000000000001074157
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1351645765 
020 |a 9781498705479 
020 |a 1315119455 
020 |a 1498705472 
020 |a 1498705480 
020 |a 9781351645768 
020 |a 9781498705486 
050 4 |a QA76.9.A25 
100 1 |a Thuraisingham, Bhavani M. 
245 0 0 |a Big data analytics with applications in insider threat detection  |c Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan 
260 |a Boca Raton, FL  |b CRC Press  |c 2018 
300 |a 1 volume  |b illustrations 
505 0 |a part PART III Stream Data Analytics for Insider Threat Detection -- chapter Introduction to Part III -- chapter 14 Insider Threat Detection as a Stream Mining Problem -- chapter 15 Survey of Insider Threat and Stream Mining -- chapter 16 Ensemble-Based Insider Threat Detection -- chapter 17 Details of Learning Classes -- chapter 18 Experiments and Results for Nonsequence Data -- chapter 19 Insider Threat Detection for Sequence Data -- chapter 20 Experiments and Results for Sequence Data -- chapter 21 Scalability Using Big Data Technologies -- chapter 22 Stream Mining and Big Data for Insider Threat Detection -- chapter Conclusion to Part III -- part PART IV Experimental BDMA and BDSP Systems -- chapter Introduction to Part IV -- chapter 23 Cloud Query Processing System for Big Data Management -- chapter 24 Big Data Analytics for Multipurpose Social Media Applications -- chapter 25 Big Data Management and Cloud for Assured Information Sharing --  
505 0 |a Includes bibliographical references and index 
505 0 |a Chapter 1 Introduction -- part PART I Supporting Technologies for BDMA and BDSP -- chapter Introduction to Part I -- chapter 2 Data Security and Privacy -- chapter 3 Data Mining Techniques -- chapter 4 Data Mining for Security Applications -- chapter 5 Cloud Computing and Semantic Web Technologies -- chapter 6 Data Mining and Insider Threat Detection -- chapter 7 Big Data Management and Analytics Technologies -- chapter Conclusion to Part I -- part PART II Stream Data Analytics -- chapter Introduction to Part II -- chapter 8 Challenges for Stream Data Classification -- chapter 9 Survey of Stream Data Classification -- chapter 10 A Multi-Partition, Multi-Chunk Ensemble for Classifying Concept-Drifting Data Streams -- chapter 11 Classification and Novel Class Detection in Concept-Drifting Data Streams -- chapter 12 Data Stream Classification with Limited Labeled Training Data -- chapter 13 Directions in Data Stream Classification -- chapter Conclusion to Part II --  
505 0 |a chapter 26 Big Data Management for Secure Information Integration -- chapter 27 Big Data Analytics for Malware Detection -- chapter 28 A Semantic Web-Based Inference Controller for Provenance Big Data -- part PART V Next Steps for BDMA and BDSP -- chapter Introduction to Part V -- chapter 29 Confidentiality, Privacy, and Trust for Big Data Systems -- chapter 30 Unified Framework for Secure Big Data Management and Analytics -- chapter 31 Big Data, Security, and the Internet of Things -- chapter 32 Big Data Analytics for Malware Detection in Smartphones -- chapter 33 Toward a Case Study in Healthcare for Big Data Analytics and Security -- chapter 34 Toward an Experimental Infrastructure and Education Program for BDMA and BDSP -- chapter 35 Directions for BDSP and BDMA -- chapter Conclusion to Part V -- chapter 36 Summary and Directions 
653 |a Computer networks / Access control / http://id.loc.gov/authorities/subjects/sh2007008424 
653 |a Big data / fast 
653 |a Big data / http://id.loc.gov/authorities/subjects/sh2012003227 
653 |a Logiciels malveillants 
653 |a Malware (Computer software) / http://id.loc.gov/authorities/subjects/sh2009005103 
653 |a Criminalité informatique / Enquêtes 
653 |a Données volumineuses 
653 |a Computer crimes / Investigation / fast 
653 |a Computer security / Data processing 
653 |a Sécurité informatique / Informatique 
653 |a Computer crimes / Investigation / http://id.loc.gov/authorities/subjects/sh85029493 
653 |a Malware (Computer software) / fast 
653 |a Computer networks / Access control / fast 
700 1 |a Masud, Mehedy  |e author 
700 1 |a Parveen, Pallabi  |e author 
700 1 |a Khan, Latifur  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9781315119458 
776 |z 9781498705486 
776 |z 9781498705479 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781351645768/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 364.1 
082 0 |a 005.8 
520 |a Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection