Book Image

Malware Science

By : Shane Molinari
Book Image

Malware Science

By: Shane Molinari

Overview of this book

In today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis. This insightful guide will teach you how to apply the principles of data science to online security, acting as both an educational resource and a practical manual for everyday use. Malware Science starts by explaining the nuances of malware, from its lifecycle to its technological aspects before introducing you to the capabilities of data science in malware detection by leveraging machine learning, statistical analytics, and social network analysis. As you progress through the chapters, you’ll explore the analytical methods of reverse engineering, machine language, dynamic scrutiny, and behavioral assessments of malicious software. You’ll also develop an understanding of the evolving cybersecurity compliance landscape with regulations such as GDPR and CCPA, and gain insights into the global efforts in curbing cyber threats. By the end of this book, you’ll have a firm grasp on the modern malware lifecycle and how you can employ data science within cybersecurity to ward off new and evolving threats.
Table of Contents (15 chapters)
1
Part 1– Introduction
Free Chapter
2
Chapter 1: Malware Science Life Cycle Overview
4
Part 2 – The Current State of Key Malware Science AI Technologies
8
Part 3 – The Future State of AI’s Use for Malware Science
11
Chapter 8: Epilogue – A Harmonious Overture to the Future of Malware Science and Cybersecurity
Appendix

Appendix

  1. Kaspersky, A Brief History of Malware
  2. Accenture. (2017). The Cost of Cybercrime Study
  3. Ahern, D. M., Clouse, A., & Turner, R. (2004). CMMI distilled: A practical introduction to integrated process improvement (3rd ed.). Addison-Wesley.
  4. Argentina National Ministry of Security. (2019). Informe de Ciberdelito
  5. Atlantic Council. (2020). Breaking trust: Shades of crisis across an insecure software supply chain
  6. Bendich, P., Marron, J. S., Miller, E., Pieloch, A., & Skwerer, S. (2016). Persistent homology analysis of brain artery trees. Annals of Applied Statistics, 10 (1).
  7. Brundage, et al. (2018). The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
  8. Buczak, Anna L. and Erhan Guven. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communications Surveys & Tutorials
  9. Buczak, Anna L. and Erhan Guven. (2016). A Survey of Data Mining and Machine Learning...