Limit search to available items
Book Cover
E-book
Author Thuraisingham, Bhavani M., author

Title Big data analytics with applications in insider threat detection / Bhavani Thuraisingham, Mohammad Mehedy Masud, Pallabi Parveen, Latifur Khan
Published Boca Raton, FL : CRC Press, [2018]
©2018

Copies

Description 1 online resource (1 volume) : illustrations
Contents Chapter 1 Introduction -- part PART I Supporting Technologies for BDMA and BDSP -- chapter Introduction to Part I -- chapter 2 Data Security and Privacy -- chapter 3 Data Mining Techniques -- chapter 4 Data Mining for Security Applications -- chapter 5 Cloud Computing and Semantic Web Technologies -- chapter 6 Data Mining and Insider Threat Detection -- chapter 7 Big Data Management and Analytics Technologies -- chapter Conclusion to Part I -- part PART II Stream Data Analytics -- chapter Introduction to Part II -- chapter 8 Challenges for Stream Data Classification -- chapter 9 Survey of Stream Data Classification -- chapter 10 A Multi-Partition, Multi-Chunk Ensemble for Classifying Concept-Drifting Data Streams -- chapter 11 Classification and Novel Class Detection in Concept-Drifting Data Streams -- chapter 12 Data Stream Classification with Limited Labeled Training Data -- chapter 13 Directions in Data Stream Classification -- chapter Conclusion to Part II -- part PART III Stream Data Analytics for Insider Threat Detection -- chapter Introduction to Part III -- chapter 14 Insider Threat Detection as a Stream Mining Problem -- chapter 15 Survey of Insider Threat and Stream Mining -- chapter 16 Ensemble-Based Insider Threat Detection -- chapter 17 Details of Learning Classes -- chapter 18 Experiments and Results for Nonsequence Data -- chapter 19 Insider Threat Detection for Sequence Data -- chapter 20 Experiments and Results for Sequence Data -- chapter 21 Scalability Using Big Data Technologies -- chapter 22 Stream Mining and Big Data for Insider Threat Detection -- chapter Conclusion to Part III -- part PART IV Experimental BDMA and BDSP Systems -- chapter Introduction to Part IV -- chapter 23 Cloud Query Processing System for Big Data Management -- chapter 24 Big Data Analytics for Multipurpose Social Media Applications -- chapter 25 Big Data Management and Cloud for Assured Information Sharing -- chapter 26 Big Data Management for Secure Information Integration -- chapter 27 Big Data Analytics for Malware Detection -- chapter 28 A Semantic Web-Based Inference Controller for Provenance Big Data -- part PART V Next Steps for BDMA and BDSP -- chapter Introduction to Part V -- chapter 29 Confidentiality, Privacy, and Trust for Big Data Systems -- chapter 30 Unified Framework for Secure Big Data Management and Analytics -- chapter 31 Big Data, Security, and the Internet of Things -- chapter 32 Big Data Analytics for Malware Detection in Smartphones -- chapter 33 Toward a Case Study in Healthcare for Big Data Analytics and Security -- chapter 34 Toward an Experimental Infrastructure and Education Program for BDMA and BDSP -- chapter 35 Directions for BDSP and BDMA -- chapter Conclusion to Part V -- chapter 36 Summary and Directions
Summary Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection
Bibliography Includes bibliographical references and index
Notes Online resource; title from title page (viewed February 1, 2018)
Subject Computer security -- Data processing
Malware (Computer software)
Big data.
Computer crimes -- Investigation.
Computer networks -- Access control.
Big data
Computer crimes -- Investigation
Computer networks -- Access control
Malware (Computer software)
Form Electronic book
Author Masud, Mehedy, author
Parveen, Pallabi, author
Khan, Latifur, author
ISBN 9781351645768
1351645765
1498705472
9781498705479
1498705480
9781498705486
1315119455
9781315119458