O'Reilly logo

Research Methods for Cyber Security by David O. Manz, Thomas W. Edgar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6

Machine Learning

Abstract

This chapter aims to introduce machine learning—a field of study that uses computational algorithms to turn empirical data into usable models. Cyber security machine learning based models need to be able to represent a real-world system, infer system properties, and learn and adapt based on knowledge and observations. The chapter starts with an introduction of the concepts and techniques of machine learning, outlining the categories of machine learning—classification, clustering, regression, and anomaly detection. The chapter then explores the use of probabilistic models, such as Bayesian networks and hidden Markov models, as data driven classification/modeling strategies, with examples given.

Keywords

Anomaly ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required