Search Books
Multicore Computing: Algori… Image Processing and Analys…

Data Mining Tools for Malware Detection

Author Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
Publisher Auerbach Publications
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
84.85 92.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $83.70

✓ Usually ships in 1 to 2 months

Share:
Book Details
ISBN / ASIN1439854548
ISBN-139781439854549
AvailabilityUsually ships in 1 to 2 months
Sales Rank2,831,860
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.

The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.

  • Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data mining
  • Includes four appendices that provide a firm foundation in data management, secure systems, and the semantic web
  • Describes the authors’ tools for stream data mining

From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.

The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View