首頁 > 計(jì)算機(jī)網(wǎng)絡(luò) >
網(wǎng)絡(luò)與通信
> Mastering Machine Learning for Penetration Testing最新章節(jié)目錄
舉報

會員
Mastering Machine Learning for Penetration Testing
Cybersecurityiscrucialforbothbusinessesandindividuals.Assystemsaregettingsmarter,wenowseemachinelearninginterruptingcomputersecurity.Withtheadoptionofmachinelearninginupcomingsecurityproducts,it’simportantforpentestersandsecurityresearcherstounderstandhowthesesystemswork,andtobreachthemfortestingpurposes.Thisbookbeginswiththebasicsofmachinelearningandthealgorithmsusedtobuildrobustsystems.Onceyou’vegainedafairunderstandingofhowsecurityproductsleveragemachinelearning,you'lldiveintothecoreconceptsofbreachingsuchsystems.Throughpracticalusecases,you’llseehowtofindloopholesandsurpassaself-learningsecuritysystem.Asyoumakeyourwaythroughthechapters,you’llfocusontopicssuchasnetworkintrusiondetectionandAVandIDSevasion.We’llalsocoverthebestpracticeswhenidentifyingambiguities,andextensivetechniquestobreachanintelligentsystem.Bytheendofthisbook,youwillbewell-versedwithidentifyingloopholesinaself-learningsecuritysystemandwillbeabletoefficientlybreachamachinelearningsystem.
目錄(206章)
倒序
- 封面
- 版權(quán)信息
- Dedication
- Packt Upsell
- Why subscribe?
- PacktPub.com
- Contributors
- About the author
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the example code files
- Download the color images
- Conventions used
- Get in touch
- Reviews
- Introduction to Machine Learning in Pentesting
- Technical requirements
- Artificial intelligence and machine learning
- Machine learning models and algorithms
- Supervised
- Bayesian classifiers
- Support vector machines
- Decision trees
- Semi-supervised
- Unsupervised
- Artificial neural networks
- Linear regression
- Logistic regression
- Clustering with k-means
- Reinforcement
- Performance evaluation
- Dimensionality reduction
- Improving classification with ensemble learning
- Machine learning development environments and Python libraries
- NumPy
- SciPy
- TensorFlow
- Keras
- pandas
- Matplotlib
- scikit-learn
- NLTK
- Theano
- Machine learning in penetration testing - promises and challenges
- Deep Exploit
- Summary
- Questions
- Further reading
- Phishing Domain Detection
- Technical requirements
- Social engineering overview
- Social Engineering Engagement Framework
- Steps of social engineering penetration testing
- Building real-time phishing attack detectors using different machine learning models
- Phishing detection with logistic regression
- Phishing detection with decision trees
- NLP in-depth overview
- Open source NLP libraries
- Spam detection with NLTK
- Summary
- Questions
- Malware Detection with API Calls and PE Headers
- Technical requirements
- Malware overview
- Malware analysis
- Static malware analysis
- Dynamic malware analysis
- Memory malware analysis
- Evasion techniques
- Portable Executable format files
- Machine learning malware detection using PE headers
- Machine learning malware detection using API calls
- Summary
- Questions
- Further reading
- Malware Detection with Deep Learning
- Technical requirements
- Artificial neural network overview
- Implementing neural networks in Python
- Deep learning model using PE headers
- Deep learning model with convolutional neural networks and malware visualization
- Convolutional Neural Networks (CNNs)
- Recurrent Neural Networks (RNNs)
- Long Short Term Memory networks
- Hopfield networks
- Boltzmann machine networks
- Malware detection with CNNs
- Promises and challenges in applying deep learning to malware detection
- Summary
- Questions
- Further reading
- Botnet Detection with Machine Learning
- Technical requirements
- Botnet overview
- Building a botnet detector model with multiple machine learning techniques
- How to build a Twitter bot detector
- Visualization with seaborn
- Summary
- Questions
- Further reading
- Machine Learning in Anomaly Detection Systems
- Technical requirements
- An overview of anomaly detection techniques
- Static rules technique
- Network attacks taxonomy
- The detection of network anomalies
- HIDS
- NIDS
- Anomaly-based IDS
- Building your own IDS
- The Kale stack
- Summary
- Questions
- Further reading
- Detecting Advanced Persistent Threats
- Technical requirements
- Threats and risk analysis
- Threat-hunting methodology
- The cyber kill chain
- The diamond model of intrusion analysis
- Threat hunting with the ELK Stack
- Elasticsearch
- Kibana
- Logstash
- Machine learning with the ELK Stack using the X-Pack plugin
- Summary
- Questions
- Evading Intrusion Detection Systems
- Technical requirements
- Adversarial machine learning algorithms
- Overfitting and underfitting
- Overfitting and underfitting with Python
- Detecting overfitting
- Adversarial machine learning
- Evasion attacks
- Poisoning attacks
- Adversarial clustering
- Adversarial features
- CleverHans
- The AML library
- EvadeML-Zoo
- Evading intrusion detection systems with adversarial network systems
- Summary
- Questions
- Further reading
- Bypassing Machine Learning Malware Detectors
- Technical requirements
- Adversarial deep learning
- Foolbox
- Deep-pwning
- EvadeML
- Bypassing next generation malware detectors with generative adversarial networks
- The generator
- The discriminator
- MalGAN
- Bypassing machine learning with reinforcement learning
- Reinforcement learning
- Summary
- Questions
- Further reading
- Best Practices for Machine Learning and Feature Engineering
- Technical requirements
- Feature engineering in machine learning
- Feature selection algorithms
- Filter methods
- Pearson's correlation
- Linear discriminant analysis
- Analysis of variance
- Chi-square
- Wrapper methods
- Forward selection
- Backward elimination
- Recursive feature elimination
- Embedded methods
- Lasso linear regression L1
- Ridge regression L2
- Tree-based feature selection
- Best practices for machine learning
- Information security datasets
- Project Jupyter
- Speed up training with GPUs
- Selecting models and learning curves
- Machine learning architecture
- Coding
- Data handling
- Business contexts
- Summary
- Questions
- Further reading
- Assessments
- Chapter 1 – Introduction to Machine Learning in Pentesting
- Chapter 2 – Phishing Domain Detection
- Chapter 3 – Malware Detection with API Calls and PE Headers
- Chapter 4 – Malware Detection with Deep Learning
- Chapter 5 – Botnet Detection with Machine Learning
- Chapter 6 – Machine Learning in Anomaly Detection Systems
- Chapter 7 – Detecting Advanced Persistent Threats
- Chapter 8 – Evading Intrusion Detection Systems with Adversarial Machine Learning
- Chapter 9 – Bypass Machine Learning Malware Detectors
- Chapter 10 – Best Practices for Machine Learning and Feature Engineering
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時間:2021-06-25 21:03:42
推薦閱讀
- 智能網(wǎng)聯(lián)汽車V2X與智能網(wǎng)聯(lián)設(shè)施I2X
- Hands-On Industrial Internet of Things
- JBoss EAP6 High Availability
- 局域網(wǎng)組建、管理與維護(hù)項(xiàng)目教程(Windows Server 2003)
- Windows Server 2003 Active Directory Design and Implementation: Creating, Migrating, and Merging Networks
- Metasploit Penetration Testing Cookbook
- 智慧光網(wǎng)絡(luò):關(guān)鍵技術(shù)、應(yīng)用實(shí)踐和未來演進(jìn)
- IPv6網(wǎng)絡(luò)切片:使能千行百業(yè)新體驗(yàn)
- Mastering Dart
- 網(wǎng)絡(luò)安全應(yīng)急響應(yīng)技術(shù)實(shí)戰(zhàn)指南
- 移動物聯(lián)網(wǎng):商業(yè)模式+案例分析+應(yīng)用實(shí)戰(zhàn)
- 工業(yè)以太網(wǎng)技術(shù):AFDX/TTE網(wǎng)絡(luò)原理、接口、互連與安全
- 網(wǎng)絡(luò)互聯(lián)技術(shù)(理論篇)
- Migrating to Drupal7
- 物聯(lián)網(wǎng)商業(yè)設(shè)計(jì)與案例
- 互聯(lián)網(wǎng)戰(zhàn)略變革與未來
- Learning Dart
- MobX Quick Start Guide
- 網(wǎng)絡(luò)編碼應(yīng)用
- Elm Web Development
- 結(jié)構(gòu)化決策力:成為你想成為的自己
- 深度實(shí)踐OCR:基于深度學(xué)習(xí)的文字識別
- 企業(yè)自動駕駛網(wǎng)絡(luò)架構(gòu)與技術(shù)
- Vue.js Quick Start Guide
- 5G波形設(shè)計(jì)
- Intel FPGA數(shù)字信號處理設(shè)計(jì)(基礎(chǔ)版)
- Web Application Development with R Using Shiny(Third Edition)
- 物聯(lián)網(wǎng)與智能制造
- Oracle APEX Cookbook(Second Edition)
- 物聯(lián)網(wǎng)感知技術(shù)與產(chǎn)業(yè)