ABSTRACT
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.
TABLE OF CONTENTS
part I|4 pages
Supporting Technologies for BDMA and BDSP
part II|4 pages
Stream Data Analytics
part III|4 pages
Stream Data Analytics for Insider Threat Detection
part IV|4 pages
Experimental BDMA and BDSP Systems
part V|4 pages
Next Steps for BDMA and BDSP