Book description
Build smart cybersecurity systems with the power of machine learning and deep learning to protect your corporate assets
Key Features
- Identify and predict security threats using artificial intelligence
- Develop intelligent systems that can detect unusual and suspicious patterns and attacks
- Learn how to test the effectiveness of your AI cybersecurity algorithms and tools
Book Description
Today's organizations spend billions of dollars globally on cybersecurity. Artificial intelligence has emerged as a great solution for building smarter and safer security systems that allow you to predict and detect suspicious network activity, such as phishing or unauthorized intrusions.
This cybersecurity book presents and demonstrates popular and successful AI approaches and models that you can adapt to detect potential attacks and protect your corporate systems. You'll learn about the role of machine learning and neural networks, as well as deep learning in cybersecurity, and you'll also learn how you can infuse AI capabilities into building smart defensive mechanisms. As you advance, you'll be able to apply these strategies across a variety of applications, including spam filters, network intrusion detection, botnet detection, and secure authentication.
By the end of this book, you'll be ready to develop intelligent systems that can detect unusual and suspicious patterns and attacks, thereby developing strong network security defenses using AI.
What you will learn
- Detect email threats such as spamming and phishing using AI
- Categorize APT, zero-days, and polymorphic malware samples
- Overcome antivirus limits in threat detection
- Predict network intrusions and detect anomalies with machine learning
- Verify the strength of biometric authentication procedures with deep learning
- Evaluate cybersecurity strategies and learn how you can improve them
Who this book is for
If you're a cybersecurity professional or ethical hacker who wants to build intelligent systems using the power of machine learning and AI, you'll find this book useful. Familiarity with cybersecurity concepts and knowledge of Python programming is essential to get the most out of this book.
Table of contents
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Preface
- Section 1: AI Core Concepts and Tools of the Trade
- Introduction to AI for Cybersecurity Professionals
- Setting Up Your AI for Cybersecurity Arsenal
- Section 2: Detecting Cybersecurity Threats with AI
-
Ham or Spam? Detecting Email Cybersecurity Threats with AI
- Detecting spam with Perceptrons
- Spam detection with SVMs
-
Phishing detection with logistic regression and decision trees
- Regression models
- Introducing linear regression models
- Linear regression with scikit-learn
- Linear regression – pros and cons
- Logistic regression
- A phishing detector with logistic regression
- Logistic regression pros and cons
- Making decisions with trees
- Decision trees rationales
- Phishing detection with decision trees
- Decision trees – pros and cons
- Spam detection with Naive Bayes
- NLP to the rescue
- Summary
-
Malware Threat Detection
-
Malware analysis at a glance
- Artificial intelligence for malware detection
- Malware goes by many names
- Malware analysis tools of the trade
- Malware detection strategies
- Static malware analysis
- Static analysis methodology
- Difficulties of static malware analysis
- How to perform static analysis
- Hardware requirements for static analysis
- Dynamic malware analysis
- Anti-analysis tricks
- Getting malware samples
- Hacking the PE file format
- Extracting malware artifacts in a dataset
- Telling different malware families apart
- Decision tree malware detectors
- Detecting metamorphic malware with HMMs
- Advanced malware detection with deep learning
- Summary
-
Malware analysis at a glance
- Network Anomaly Detection with AI
- Section 3: Protecting Sensitive Information and Assets
- Securing User Authentication
-
Fraud Prevention with Cloud AI Solutions
- Introducing fraud detection algorithms
- Predictive analytics for credit card fraud detection
- Getting to know IBM Watson Cloud solutions
- Importing sample data and running Jupyter Notebook in the cloud
- Evaluating the quality of our predictions
- Summary
- GANs - Attacks and Defenses
- Section 4: Evaluating and Testing Your AI Arsenal
-
Evaluating Algorithms
- Best practices of feature engineering
- Evaluating a detector's performance with ROC
- How to split data into training and test sets
- Using cross validation for algorithms
- Summary
- Assessing your AI Arsenal
- Other Books You May Enjoy
Product information
- Title: Hands-On Artificial Intelligence for Cybersecurity
- Author(s):
- Release date: August 2019
- Publisher(s): Packt Publishing
- ISBN: 9781789804027
You might also like
book
Artificial Intelligence, Cybersecurity and Cyber Defence
The aim of the book is to analyse and understand the impacts of artificial intelligence in …
book
Hands-On Machine Learning for Cybersecurity
Get into the world of smart data security using machine learning algorithms and Python libraries Key …
book
Artificial Intelligence Basics: A Non-Technical Introduction
Artificial intelligence touches nearly every part of your day. While you may initially assume that technology …
book
Cybersecurity – Attack and Defense Strategies - Second Edition
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats …