|
|
xi | |
|
|
xv | |
Preface |
|
xvii | |
Authors |
|
xxi | |
|
|
1 | (22) |
|
|
2 | (3) |
|
|
5 | (2) |
|
|
7 | (1) |
|
1.4 Review of Cybersecurity Solutions |
|
|
8 | (6) |
|
1.4.1 Proactive Security Solutions |
|
|
8 | (1) |
|
1.4.2 Reactive Security Solutions |
|
|
9 | (1) |
|
1.4.2.1 Misuse/Signature Detection |
|
|
10 | (1) |
|
1.4.2.2 Anomaly Detection |
|
|
10 | (3) |
|
|
13 | (1) |
|
|
13 | (1) |
|
1.4.2.5 Profiling Modules |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (7) |
|
2 Classical Machine-Learning Paradigms for Data Mining |
|
|
23 | (34) |
|
|
24 | (20) |
|
2.1.1 Fundamentals of Supervised Machine-Learning Methods |
|
|
24 | (1) |
|
2.1.1.1 Association Rule Classification |
|
|
24 | (1) |
|
2.1.1.2 Artificial Neural Network |
|
|
25 | (2) |
|
2.1.1.3 Support Vector Machines |
|
|
27 | (2) |
|
|
29 | (1) |
|
|
30 | (1) |
|
2.1.1.6 Hidden Markov Model |
|
|
31 | (3) |
|
|
34 | (1) |
|
2.1.1.8 Bootstrap, Bagging, and AdaBoost |
|
|
34 | (3) |
|
|
37 | (1) |
|
2.1.2 Popular Unsupervised Machine-Learning Methods |
|
|
38 | (1) |
|
2.1.2.1 k-Means Clustering |
|
|
38 | (1) |
|
2.1.2.2 Expectation Maximum |
|
|
38 | (2) |
|
2.1.2.3 k-Nearest Neighbor |
|
|
40 | (1) |
|
|
41 | (1) |
|
2.1.2.5 Principal Components Analysis |
|
|
41 | (2) |
|
2.1.2.6 Subspace Clustering |
|
|
43 | (1) |
|
2.2 Improvements on Machine-Learning Methods |
|
|
44 | (6) |
|
2.2.1 New Machine-Learning Algorithms |
|
|
44 | (2) |
|
|
46 | (1) |
|
2.2.3 Feature Selection Methods |
|
|
46 | (1) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (3) |
|
2.3.1 Challenges in Data Mining |
|
|
50 | (1) |
|
2.3.1.1 Modeling Large-Scale Networks |
|
|
50 | (1) |
|
2.3.1.2 Discovery of Threats |
|
|
50 | (1) |
|
2.3.1.3 Network Dynamics and Cyber Attacks |
|
|
51 | (1) |
|
2.3.1.4 Privacy Preservation in Data Mining |
|
|
51 | (1) |
|
2.3.2 Challenges in Machine Learning (Supervised Learning and Unsupervised Learning) |
|
|
51 | (1) |
|
2.3.2.1 Online Learning Methods for Dynamic Modeling of Network Data |
|
|
52 | (1) |
|
2.3.2.2 Modeling Data with Skewed Class Distributions to Handle Rare Event Detection |
|
|
52 | (1) |
|
2.3.2.3 Feature Extraction for Data with Evolving Characteristics |
|
|
53 | (1) |
|
|
53 | (2) |
|
2.4.1 Understanding the Fundamental Problems of Machine-Learning Methods in Cybersecurity |
|
|
54 | (1) |
|
2.4.2 Incremental Learning in Cyberinfrastructures |
|
|
54 | (1) |
|
2.4.3 Feature Selection/Extraction for Data with Evolving Characteristics |
|
|
54 | (1) |
|
2.4.4 Privacy-Preserving Data Mining |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (2) |
|
3 Supervised Learning for Misuse/Signature Detection |
|
|
57 | (28) |
|
3.1 Misuse/Signature Detection |
|
|
58 | (2) |
|
3.2 Machine Learning in Misuse/Signature Detection |
|
|
60 | (1) |
|
3.3 Machine-Learning Applications in Misuse Detection |
|
|
61 | (21) |
|
3.3.1 Rule-Based Signature Analysis |
|
|
61 | (1) |
|
3.3.1.1 Classification Using Association Rules |
|
|
62 | (3) |
|
|
65 | (3) |
|
3.3.2 Artificial Neural Network |
|
|
68 | (1) |
|
3.3.3 Support Vector Machine |
|
|
69 | (1) |
|
3.3.4 Genetic Programming |
|
|
70 | (3) |
|
3.3.5 Decision Tree and CART |
|
|
73 | (1) |
|
3.3.5.1 Decision-Tree Techniques |
|
|
74 | (1) |
|
3.3.5.2 Application of a Decision Tree in Misuse Detection |
|
|
75 | (2) |
|
|
77 | (2) |
|
|
79 | (1) |
|
3.3.6.1 Bayesian Network Classifier |
|
|
79 | (3) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (3) |
|
4 Machine Learning for Anomaly Detection |
|
|
85 | (30) |
|
|
85 | (1) |
|
|
86 | (1) |
|
4.3 Machine Learning in Anomaly Detection Systems |
|
|
87 | (1) |
|
4.4 Machine-Learning Applications in Anomaly Detection |
|
|
88 | (23) |
|
4.4.1 Rule-Based Anomaly Detection (Table 1.3, C.6) |
|
|
89 | (1) |
|
4.4.1.1 Fuzzy Rule-Based (Table 1.3, C.6) |
|
|
90 | (3) |
|
4.4.2 ANN (Table 1.3, C.9) |
|
|
93 | (1) |
|
4.4.3 Support Vector Machines (Table 1.3, C.12) |
|
|
94 | (1) |
|
4.4.4 Nearest Neighbor-Based Learning (Table 1.3, C.11) |
|
|
95 | (3) |
|
4.4.5 Hidden Markov Model |
|
|
98 | (1) |
|
|
99 | (1) |
|
4.4.7 Unsupervised Anomaly Detection |
|
|
100 | (1) |
|
4.4.7.1 Clustering-Based Anomaly Detection |
|
|
101 | (2) |
|
|
103 | (1) |
|
4.4.7.3 Principal Component Analysis/Subspace |
|
|
104 | (2) |
|
4.4.7.4 One-Class Supervised Vector Machine |
|
|
106 | (4) |
|
4.4.8 Information Theoretic (Table 1.3, C.5) |
|
|
110 | (1) |
|
4.4.9 Other Machine-Learning Methods Applied in Anomaly Detection (Table 1.3, C.2) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
112 | (3) |
|
5 Machine Learning for Hybrid Detection |
|
|
115 | (24) |
|
|
116 | (2) |
|
5.2 Machine Learning in Hybrid Intrusion Detection Systems |
|
|
118 | (1) |
|
5.3 Machine-Learning Applications in Hybrid Intrusion Detection |
|
|
119 | (16) |
|
5.3.1 Anomaly-Misuse Sequence Detection System |
|
|
119 | (1) |
|
5.3.2 Association Rules in Audit Data Analysis and Mining (Table 1.4, D.4) |
|
|
120 | (2) |
|
5.3.3 Misuse-Anomaly Sequence Detection System |
|
|
122 | (6) |
|
5.3.4 Parallel Detection System |
|
|
128 | (4) |
|
5.3.5 Complex Mixture Detection System |
|
|
132 | (2) |
|
5.3.6 Other Hybrid Intrusion Systems |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (3) |
|
6 Machine Learning for Scan Detection |
|
|
139 | (20) |
|
6.1 Scan and Scan Detection |
|
|
140 | (2) |
|
6.2 Machine Learning in Scan Detection |
|
|
142 | (1) |
|
6.3 Machine-Learning Applications in Scan Detection |
|
|
143 | (13) |
|
6.4 Other Scan Techniques with Machine-Learning Methods |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (2) |
|
7 Machine Learning for Profiling Network Traffic |
|
|
159 | (18) |
|
|
159 | (1) |
|
7.2 Network Traffic Profiling and Related Network Traffic Knowledge |
|
|
160 | (1) |
|
7.3 Machine Learning and Network Traffic Profiling |
|
|
161 | (1) |
|
7.4 Data-Mining and Machine-Learning Applications in Network Profiling |
|
|
162 | (12) |
|
7.4.1 Other Profiling Methods and Applications |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (2) |
|
8 Privacy-Preserving Data Mining |
|
|
177 | (30) |
|
8.1 Privacy Preservation Techniques in PPDM |
|
|
180 | (4) |
|
|
180 | (1) |
|
8.1.2 Privacy Preservation in Data Mining |
|
|
180 | (4) |
|
|
184 | (5) |
|
8.2.1 Introduction of the PPDM Workflow |
|
|
184 | (1) |
|
|
185 | (1) |
|
8.2.3 Performance Evaluation of PPDM Algorithms |
|
|
185 | (4) |
|
8.3 Data-Mining and Machine-Learning Applications in PPDM |
|
|
189 | (13) |
|
8.3.1 Privacy Preservation Association Rules (Table 1.1, A.4) |
|
|
189 | (4) |
|
8.3.2 Privacy Preservation Decision Tree (Table 1.1, A.6) |
|
|
193 | (1) |
|
8.3.3 Privacy Preservation Bayesian Network (Table 1.1, A.2) |
|
|
194 | (3) |
|
8.3.4 Privacy Preservation KNN (Table 1.1, A.7) |
|
|
197 | (2) |
|
8.3.5 Privacy Preservation k-Means Clustering (Table 1.1, A.3) |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
204 | (3) |
|
9 Emerging Challenges in Cybersecurity |
|
|
207 | (18) |
|
9.1 Emerging Cyber Threats |
|
|
208 | (5) |
|
9.1.1 Threats from Malware |
|
|
208 | (1) |
|
9.1.2 Threats from Botnets |
|
|
209 | (2) |
|
9.1.3 Threats from Cyber Warfare |
|
|
211 | (1) |
|
9.1.4 Threats from Mobile Communication |
|
|
211 | (1) |
|
|
212 | (1) |
|
9.2 Network Monitoring, Profiling, and Privacy Preservation |
|
|
213 | (5) |
|
9.2.1 Privacy Preservation of Original Data |
|
|
213 | (1) |
|
9.2.2 Privacy Preservation in the Network Traffic Monitoring and Profiling Algorithms |
|
|
214 | (1) |
|
9.2.3 Privacy Preservation of Monitoring and Profiling Data |
|
|
215 | (1) |
|
9.2.4 Regulation, Laws, and Privacy Preservation |
|
|
215 | (1) |
|
9.2.5 Privacy Preservation, Network Monitoring, and Profiling Example: PRISM |
|
|
216 | (2) |
|
9.3 Emerging Challenges in Intrusion Detection |
|
|
218 | (4) |
|
9.3.1 Unifying the Current Anomaly Detection Systems |
|
|
219 | (1) |
|
9.3.2 Network Traffic Anomaly Detection |
|
|
219 | (1) |
|
9.3.3 Imbalanced Learning Problem and Advanced Evaluation Metrics for IDS |
|
|
220 | (1) |
|
9.3.4 Reliable Evaluation Data Sets or Data Generation Tools |
|
|
221 | (1) |
|
9.3.5 Privacy Issues in Network Anomaly Detection |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (2) |
Index |
|
225 | |