Book Image

Hands-On Artificial Intelligence for Cybersecurity

By : Alessandro Parisi
Book Image

Hands-On Artificial Intelligence for Cybersecurity

By: Alessandro Parisi

Overview of this book

Today's organizations spend billions of dollars globally on cybersecurity. Artificial intelligence has emerged as a great solution for building smarter and safer security systems that allow you to predict and detect suspicious network activity, such as phishing or unauthorized intrusions. This cybersecurity book presents and demonstrates popular and successful AI approaches and models that you can adapt to detect potential attacks and protect your corporate systems. You'll learn about the role of machine learning and neural networks, as well as deep learning in cybersecurity, and you'll also learn how you can infuse AI capabilities into building smart defensive mechanisms. As you advance, you'll be able to apply these strategies across a variety of applications, including spam filters, network intrusion detection, botnet detection, and secure authentication. By the end of this book, you'll be ready to develop intelligent systems that can detect unusual and suspicious patterns and attacks, thereby developing strong network security defenses using AI.
Table of Contents (16 chapters)
Free Chapter
1
Section 1: AI Core Concepts and Tools of the Trade
4
Section 2: Detecting Cybersecurity Threats with AI
8
Section 3: Protecting Sensitive Information and Assets
12
Section 4: Evaluating and Testing Your AI Arsenal

Malware analysis at a glance

One of the most interesting aspects for those approaching malware analysis, is learning to distinguish, for example, legitimate binary files from those that are potentially dangerous for the integrity of the machines and the data they contain. We refer generically to binary files rather than to executable files (that is, files with extensions such as .exe or .dll), since malware can even hide in apparently innocuous files such as image files (files with extensions such as .jpg or .png).

In the same way, even text documents (such as .docx or .pdf) can turn out to be healthy carriers or vehicles of software infections, despite their non-executable file format. Moreover, the first stage of the spread of a malware (in both the cases of a home PC and a company LAN) often happens by compromising the integrity of the files residing within the machines being...