Intelligent Security Systems最新文献

筛选
英文 中文
Adversarial Machine Learning 对抗性机器学习
Intelligent Security Systems Pub Date : 2021-09-24 DOI: 10.1002/9781119771579.ch6
L. Reznik
{"title":"Adversarial Machine Learning","authors":"L. Reznik","doi":"10.1002/9781119771579.ch6","DOIUrl":"https://doi.org/10.1002/9781119771579.ch6","url":null,"abstract":"The chapter introduces novel adversarial machine learning attacks and the taxonomy of its cases, where machine learning is used against AI‐based classifiers to make them fail. It investigates a possible data corruption and quality decrease influence on the classifier performance. The module proposes data restoration procedures and other measures to protect against adversarial attacks. Generative adversarial networks are introduced, and their use is discussed. Multiple algorithm examples and use cases are included.","PeriodicalId":318786,"journal":{"name":"Intelligent Security Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116932837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Firewall Design and Implementation 防火墙的设计与实现
Intelligent Security Systems Pub Date : 2021-09-24 DOI: 10.1002/9781119771579.ch2
L. Reznik
{"title":"Firewall Design and Implementation","authors":"L. Reznik","doi":"10.1002/9781119771579.ch2","DOIUrl":"https://doi.org/10.1002/9781119771579.ch2","url":null,"abstract":"The chapter introduces firewalls and their design as the first line of defense mechanism. This chapter's goal is twofold: (i) to cover major aspects of the firewall design and operation for security professional education and (ii) explain how artificial intelligence and machine learning techniques and technologies are employed for enhancing firewalls and the security they provide. For the first goal, it provides the firewall definition, discusses the functions, possible architectures, and operational models concentrating on the presentation of their advantages and drawbacks. It includes the step‐by‐step guide to the firewall design and implementation process ranging from planning to deployment and maintenance. For the second goal, the chapter moves the reader from basic rules design to sophisticated AI and ML employment algorithms that improve it. The major emphasis is placed on using rules to set up, configure, and modify the firewall's policy. Both generic and specific rules are discussed as well as their formulation and editing with firewall tools. Substantial rules design principles and conflict avoidance and resolution are presented. The modern AI‐based developments are presented at the end.","PeriodicalId":318786,"journal":{"name":"Intelligent Security Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125210644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware and Vulnerabilities Detection and Protection 恶意软件和漏洞检测与保护
Intelligent Security Systems Pub Date : 2021-09-24 DOI: 10.1002/9781119771579.ch4
L. Reznik
{"title":"Malware and Vulnerabilities Detection and Protection","authors":"L. Reznik","doi":"10.1002/9781119771579.ch4","DOIUrl":"https://doi.org/10.1002/9781119771579.ch4","url":null,"abstract":"The chapter discusses malware types, its detection and recognition techniques and tools. It provides and extensive classification of various malware and virus families, discusses their taxonomy, basic composition and comparison between them. Beyond pure malware examples, it reviews spam and software vulnerabilities too. Multiple real life cases and examples are provided. Then it moves to presenting malware detection principles, algorithms and techniques, as well as anti‐malware tools and technologies. Their examples and use cases are included.","PeriodicalId":318786,"journal":{"name":"Intelligent Security Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123809359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Security with Artificial Intelligence, Machine Learning, and Data Science Combination 计算机安全与人工智能,机器学习和数据科学的结合
Intelligent Security Systems Pub Date : 2021-09-24 DOI: 10.1002/9781119771579.ch1
L. Reznik
{"title":"Computer Security with Artificial Intelligence, Machine Learning, and Data Science Combination","authors":"L. Reznik","doi":"10.1002/9781119771579.ch1","DOIUrl":"https://doi.org/10.1002/9781119771579.ch1","url":null,"abstract":"The chapter discusses the basic concepts of computer security as well as the taxonomy and classification of the fundamental algorithms in the domains of artificial intelligence, machine learning, and data science in relation to their applications in computer security. It reviews the sources of security threats and the attacks, using the area of IoT and wireless devices as an example, as well as examines the possible protection mechanisms and tools. The module provides a general classification of intelligent approaches and their relationship to various computer security fields. It focuses on an introduction of the major intelligent techniques and technologies in computer security, such as expert systems, fuzzy logic, machine learning, artificial neural networks, and genetic algorithms. While presenting multiple techniques, the text emphasizes their advantage in comparison to each other as well as the obstacles in their further progress. Short algorithm descriptions and code examples are included.","PeriodicalId":318786,"journal":{"name":"Intelligent Security Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128041296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信