Machine learning for cyber agents : attack and defence / Stanislav Abaimov, Maurizio Martellini.

Author
Abaimov, Stanislav, 1989- [Browse]
Format
Book
Language
English
Published/​Created
  • Singapore : Springer, [2022]
  • ©2022
Description
1 online resource (235 pages)

Details

Subject(s)
Author
Series
Advanced Sciences and Technologies for Security Applications Ser. [More in this series]
Bibliographic references
Includes bibliographical references.
Source of description
Description based on print version record.
Contents
  • Intro
  • Contents
  • Abbreviations
  • Disclosure Statement
  • List of Figures
  • List of Tables
  • 1 Introduction
  • 1.1 Motivation
  • 1.2 Aim
  • 1.3 Structure
  • Reference
  • 2 Understanding Machine Learning
  • 2.1 Setting the Scene
  • 2.2 Conceptual and Operational Landscape
  • 2.2.1 Machine Learning as a Concept
  • 2.2.2 Algorithms and Their Application
  • 2.2.3 Models
  • 2.2.4 Methods
  • 2.3 Explainability of Machine Learning
  • 2.3.1 Data Collection
  • 2.3.2 Pre-processing
  • 2.3.3 Training
  • 2.3.4 Prediction
  • 2.3.5 Evaluation and Metrics
  • 2.3.6 Fine-Tuning
  • 2.4 Quantum Machine Learning
  • 2.4.1 Quantum Computers
  • 2.4.2 Main Notions
  • 2.4.3 Specificity of Quantum Machine Learning
  • 2.5 Machine Learning Limitations
  • 2.6 Conclusion
  • References
  • 3 Defence
  • 3.1 Machine Learning for Cyber Security
  • 3.2 IDS Supporting Human Operators
  • 3.3 Network Security
  • 3.3.1 Packet Parsing-Based Detection
  • 3.3.2 Payload Analysis-Based Detection
  • 3.4 Computer Security
  • 3.4.1 Hardware Behaviour
  • 3.4.2 Operating System
  • 3.4.3 Connected Devices
  • 3.4.4 Software Analysis
  • 3.5 AI-Specific Security Issues
  • 3.5.1 Adversarial Attacks on Artificial Intelligence
  • 3.5.2 Defence Methods Against Adversarial Attacks
  • 3.5.3 Development of Safe Artificial Intelligence Systems
  • 3.5.4 Hybrid Defence
  • 3.6 Conclusion
  • 4 Attack
  • 4.1 Machine Learning for Malware
  • 4.2 Machine Learning Enhancing Cyber Attacks
  • 4.2.1 Phishing
  • 4.2.2 Exploitation
  • 4.2.3 Network Traffic Masquerading
  • 4.2.4 Bots and Botnets
  • 4.2.5 Password Guessing
  • 4.2.6 Ransomware
  • 4.2.7 Cryptomining Malware
  • 4.2.8 Recovery
  • 4.2.9 Cryptanalysis
  • 4.2.10 Forensics Investigation
  • 4.2.11 Attacks Against Hardware
  • 4.3 Weaponizing AI
  • 4.3.1 Machine Learning for Weapons Autonomy
  • 4.3.2 AWS Vulnerabilities
  • 4.4 Conclusion
  • Reference.
  • 5 International Resonance
  • 5.1 Debates Over AI Integration and Governance
  • 5.1.1 Debates Over Technical Issues
  • 5.1.2 Debates Over Legal and Ethical Issues
  • 5.1.3 Debates Over Governance
  • 5.1.4 Debates Over Military Use of AI Offensive Capabilities
  • 5.2 Multilateral Collaboration for Peaceful AI
  • 5.2.1 Europe Fit for Digital Age
  • 5.2.2 African Digital Transformation
  • 5.2.3 ASEAN Digital Masterplan
  • 5.2.4 United Nations Global Agenda for AI
  • 5.3 Conclusion
  • 6 Prospects
  • 6.1 Technological Development
  • 6.2 Societal Transformation
  • 7 Conclusion
  • Glossary
  • References.
ISBN
9783030915858 ((electronic bk.))
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
Other views
Staff view

Supplementary Information