ABSTRACT

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware d

chapter |34 pages

PART I

INING ECURITY

chapter 4|12 pages

DATA MINING FOR SECURITY APPLICATIONS

INING FOR ECURITY PPLICATIONS

chapter 5|12 pages

DESIGN AND IMPLEMENTATION OF DATA MINING TOOLS

ESIGN AND MPLEMENTATION INING

chapter |2 pages

Conclusion to Part I

part |2 pages

PART II

chapter 6|8 pages

EMAIL WORM D

ETECTION

chapter 7|14 pages

DESIGN OF THE DATA MINING TOOL

ESIGN OF THE INING

chapter 8|12 pages

EVALUATION AND RESULTS

VALUATION AND ESULTS

chapter |2 pages

Conclusion to Part II

part |2 pages

PART III

chapter 9|8 pages

MALICIOUS EXECUTABLES

ALICIOUS XECUTABLES

chapter 10|14 pages

DESIGN OF THE DATA MINING TOOL

ESIGN OF THE INING

chapter 11|14 pages

EVALUATION AND RESULTS

VALUATION AND ESULTS

chapter |2 pages

Conclusion to Part III

part |2 pages

PART IV

chapter 12|8 pages

DETECTING REMOTE EXPLOITS

ETECTING EMOTE XPLOITS

chapter 13|10 pages

DESIGN OF THE DATA MINING TOOL

ESIGN OF THE INING

chapter 14|10 pages

EVALUATION AND RESULTS

VALUATION AND ESULTS

chapter |2 pages

Conclusion to Part IV

part |2 pages

PART V

chapter 15|8 pages

DETECTING BOTNETS

ETECTING OTNETS

chapter 16|10 pages

DESIGN OF THE DATA MINING TOOL

ESIGN OF THE INING

chapter 17|6 pages

EVALUATION AND RESULTS

VALUATION AND ESULTS

chapter |2 pages

Conclusion to Part V

part |2 pages

PART VI

chapter 18|10 pages

STREAM MINING

TREAM INING

chapter 19|10 pages

DESIGN OF THE DATA MINING TOOL

ESIGN OF THE INING

chapter 20|10 pages

EVALUATION AND RESULTS

VALUATION AND ESULTS

chapter |2 pages

Conclusion for Part VI

part |2 pages

PART VII

chapter 21|18 pages

DATA MINING FOR ACTIVE DEFENSE

INING FOR CTIVE EFENSE

chapter 22|16 pages

DATA MINING FOR INSIDER THREAT DETECTION

INING FOR NSIDER HREAT ETECTION

chapter 23|18 pages

DEPENDABLE REAL-TIME DATA MINING

EPENDABLE INING

chapter 24|18 pages

FIREWALL POLICY ANALYSIS

IREWALL OLICY NALYSIS

chapter |2 pages

Conclusion to Part VII

chapter 25|6 pages

SUMMARY AND DIRECTIONS

UMMARY AND IRECTIONS