Attribution of Advanced Persistent Threats
Title | Attribution of Advanced Persistent Threats PDF eBook |
Author | Timo Steffens |
Publisher | Springer Nature |
Pages | 207 |
Release | 2020-07-20 |
Genre | Computers |
ISBN | 3662613131 |
An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension. Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science. This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.
Malware Data Science
Title | Malware Data Science PDF eBook |
Author | Joshua Saxe |
Publisher | No Starch Press |
Pages | 274 |
Release | 2018-09-25 |
Genre | Computers |
ISBN | 1593278594 |
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you'll need to know how to think like a data scientist. In Malware Data Science, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualization, and shows you how to apply these methods to malware detection and analysis. You'll learn how to: - Analyze malware using static analysis - Observe malware behavior using dynamic analysis - Identify adversary groups through shared code analysis - Catch 0-day vulnerabilities by building your own machine learning detector - Measure malware detector accuracy - Identify malware campaigns, trends, and relationships through data visualization Whether you're a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, Malware Data Science will help you stay ahead of the curve.
Cyber Security
Title | Cyber Security PDF eBook |
Author | Xiaochun Yun |
Publisher | Springer |
Pages | 184 |
Release | 2019-02-19 |
Genre | Computers |
ISBN | 9811366217 |
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security.
Data Mining
Title | Data Mining PDF eBook |
Author | |
Publisher | BoD – Books on Demand |
Pages | 226 |
Release | 2022-03-30 |
Genre | Computers |
ISBN | 1839692669 |
The availability of big data due to computerization and automation has generated an urgent need for new techniques to analyze and convert big data into useful information and knowledge. Data mining is a promising and leading-edge technology for mining large volumes of data, looking for hidden information, and aiding knowledge discovery. It can be used for characterization, classification, discrimination, anomaly detection, association, clustering, trend or evolution prediction, and much more in fields such as science, medicine, economics, engineering, computers, and even business analytics. This book presents basic concepts, ideas, and research in data mining.
Inside Cyber Warfare
Title | Inside Cyber Warfare PDF eBook |
Author | Jeffrey Caruso |
Publisher | "O'Reilly Media, Inc." |
Pages | 161 |
Release | 2024-09-16 |
Genre | Computers |
ISBN | 1098138481 |
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East, including cyber attacks that result in the physical destruction of the target and the pairing of cognitive with maneuver warfare. Inside Cyber Warfare features an exclusive deep dive into the wartime operations of an offensive cyber unit of Ukraine's Ministry of Defense as it works to defend the nation against Russian forces, particularly since the 2022 invasion: See what happened when a Ukrainian cyber and special operations team worked together to destroy a secret missile laboratory Explore the legal status of cyber warfare and civilian hackers Discover how a cyber team with little money and limited resources learned to create fire from the manipulation of code in automated systems Distinguish reality from fiction regarding AI safety and existential risk Learn new strategies for keeping you and your loved ones safe in an increasingly complex and insecure world
Communications and Multimedia Security
Title | Communications and Multimedia Security PDF eBook |
Author | Bart De Decker |
Publisher | Springer |
Pages | 157 |
Release | 2014-09-05 |
Genre | Computers |
ISBN | 9783662448847 |
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014. The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.
Weaponizing Cyberspace
Title | Weaponizing Cyberspace PDF eBook |
Author | Nicholas Michael Sambaluk |
Publisher | Bloomsbury Publishing USA |
Pages | 284 |
Release | 2022-02-04 |
Genre | Political Science |
ISBN | 1440876924 |
The Russian regime's struggle for internal control drives multifaceted actions in cyberspace that do not stop at national borders. Cybercrime, technical hacking, and disinformation are complementary tools to preserve national power internally while projecting effects onto myriad neighbors and rivals. Russian activity in the cyber domain is infamous in the United States and other Western countries. Weaponizing Cyberspace explores the Russian proclivity, particularly in the 21st century, for using cyberspace as an environment in which to launch technical attacks and disinformation campaigns that sow chaos and distraction in ways that provide short-term advantage to autocrats in the Kremlin. Arguing that Russia's goal is to divide people, Sambaluk explains that Russia's modus operandi in disinformation campaigning is specifically to find and exploit existing sore spots in other countries. In the U.S., this often means inflaming political tensions among people on the far left and far right. Russia's actions have taken different forms, including the sophisticated surveillance and sabotage of critical infrastructure, the ransoming of data by criminal groups, and a welter of often mutually contradictory disinformation messages that pollute online discourse within and beyond Russia. Whether deployed to contribute to hybrid war or to psychological fracture and disillusionment in targeted societies, the threat is real and must be understood and effectively addressed.