Information Fusion For Cyber-security Analytics (studies In Computational Intelligence)
by Izzat M Alsmadi /
2016 / English / PDF
7.6 MB Download
This book highlights several gaps that have not been addressed in
existing cyber security research. It first discusses the recent
attack prediction techniques that utilize one or more aspects of
information to create attack prediction models. The second part
is dedicated to new trends on information fusion and their
applicability to cyber security; in particular, graph data
analytics for cyber security, unwanted traffic detection and
control based on trust management software defined networks,
security in wireless sensor networks & their applications,
and emerging trends in security system design using the concept
of social behavioral biometric. The book guides the design of new
commercialized tools that can be introduced to improve the
accuracy of existing attack prediction models. Furthermore, the
book advances the use of Knowledge-based Intrusion Detection
Systems (IDS) to complement existing IDS technologies. It is
aimed towards cyber security researchers.
This book highlights several gaps that have not been addressed in
existing cyber security research. It first discusses the recent
attack prediction techniques that utilize one or more aspects of
information to create attack prediction models. The second part
is dedicated to new trends on information fusion and their
applicability to cyber security; in particular, graph data
analytics for cyber security, unwanted traffic detection and
control based on trust management software defined networks,
security in wireless sensor networks & their applications,
and emerging trends in security system design using the concept
of social behavioral biometric. The book guides the design of new
commercialized tools that can be introduced to improve the
accuracy of existing attack prediction models. Furthermore, the
book advances the use of Knowledge-based Intrusion Detection
Systems (IDS) to complement existing IDS technologies. It is
aimed towards cyber security researchers.