Bots are programs that are capable of performing automative tasks. Bots might not be malicious, but in recent times they have been primarily used for malicious purposes only. A computer acting as a bot when aggregated with several other such computers is called a botnet, and primarily called a spam botnet. Spam botnets are used to spread spam emails and initiate DDoS attacks on servers; they may or may not have web scrapers spidering that automatically gather data.
Hands-On Machine Learning for Cybersecurity
By :
Hands-On Machine Learning for Cybersecurity
By:
Overview of this book
Cyber threats today are one of the costliest losses that an organization can face. In this book, we use the most efficient tool to solve the big problems that exist in the cybersecurity domain.
The book begins by giving you the basics of ML in cybersecurity using Python and its libraries. You will explore various ML domains (such as time series analysis and ensemble modeling) to get your foundations right. You will implement various examples such as building system to identify malicious URLs, and building a program to detect fraudulent emails and spam. Later, you will learn how to make effective use of K-means algorithm to develop a solution to detect and alert you to any malicious activity in the network. Also learn how to implement biometrics and fingerprint to validate whether the user is a legitimate user or not.
Finally, you will see how we change the game with TensorFlow and learn how deep learning is effective for creating models and training systems
Table of Contents (13 chapters)
Preface
Free Chapter
Basics of Machine Learning in Cybersecurity
Time Series Analysis and Ensemble Modeling
Segregating Legitimate and Lousy URLs
Knocking Down CAPTCHAs
Using Data Science to Catch Email Fraud and Spam
Efficient Network Anomaly Detection Using k-means
Decision Tree and Context-Based Malicious Event Detection
Catching Impersonators and Hackers Red Handed
Changing the Game with TensorFlow
Financial Fraud and How Deep Learning Can Mitigate It
Case Studies
Other Books You May Enjoy
Customer Reviews