Chapter 1

Introduction

Abstract

In this chapter we discuss the purpose of the book and the mathematical underpinnings of it.

Keywords

Introduction; Models; Mathematical techniques

The practice of cybersecurity involves diverse data sets, including DNS, malware samples, routing data, network traffic, user interaction, and more. There is no “one size fits all” analysis scheme for this data, a new method must be created for each data set. The best methods have a mathematical basis to them.

A mathematical model of a system is an abstract description of that system that uses mathematical concepts. We want to take the systems in cybersecurity and create mathematical models of them in order to analyze the systems, make predictions of the system, ...

Get Cybersecurity and Applied Mathematics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.