000 -LEADER |
fixed length control field |
07000cam a2200517 i 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250816110101.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
fixed length control field |
m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250816s2023 njum ob u001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119898870 |
Qualifying information |
hardcover |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119898894 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1119898897 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119898887 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1119898889 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119898900 |
Qualifying information |
electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1119898900 |
Qualifying information |
electronic book |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)1372138336 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.T365 2023 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8/8 |
Edition number |
23/eng/20230302 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Preferred name for the person |
Tari, Zahir, |
Dates associated with a name |
1961- |
Authority record control number |
https://id.loc.gov/authorities/names/nb99009922 |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Data exfiltration threats and prevention techniques : |
Remainder of title |
machine learning and memory-based data security / |
Statement of responsibility, etc |
Zahir Tari, RMIT University, Melbourne, Australia, Nasrin Sohrabi, RMIT University, Melbourne, Australia, Yasaman Samadi, RMIT University, Melbourne, Australia, Jakapan Suaboot, Prince of Songkla University, Phuket, Thailand. |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Hoboken, New Jersey : |
Name of publisher, distributor, etc |
John Wiley & Sons, Inc., |
Date of publication, distribution, etc |
[2023] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (xxiii, 260 pages) : |
Other physical details |
illustrations. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent. |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia. |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier. |
340 ## - PHYSICAL MEDIUM |
Source |
rdacc |
Authority record control number or standard number |
http://rdaregistry.info/termList/RDAColourContent/1003. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - CONTENTS |
Formatted contents note |
Table of Contents<br/>About the Authors xv<br/><br/>Acknowledgments xvii<br/><br/>Acronyms xix<br/><br/>Abstract xxi<br/><br/>1 Introduction 1<br/><br/>1.1 Data Exfiltration Methods 3<br/><br/>1.2 Important Questions 7<br/><br/>1.3 Book Scope 9<br/><br/>1.4 Book Summary 11<br/><br/>1.5 Book Structure 15<br/><br/>2 Background19<br/><br/>2.1 Hidden Markov Model 19<br/><br/>2.2 Memory Forensics 24<br/><br/>2.3 Bag-of-Words Model 27<br/><br/>2.4 Sparse Distributed Representation 28<br/><br/>2.5 Summary 29<br/><br/>3 Data Security Threats 31<br/><br/>3.1 Data Security 32<br/><br/>3.2 Security vs. Protection vs. Privacy 35<br/><br/>3.3 Advanced Persistent Threats Attacks 36<br/><br/>3.4 Cybersecurity Threats 38<br/><br/>3.5 Conclusion 59<br/><br/>4 Use Cases Data Leakage Attacks 63<br/><br/>4.1 Most Significant Attacks 63<br/><br/>4.2 Top Infection Vectors 68<br/><br/>4.3 Top Threats of Recent Years 70<br/><br/>4.4 Malware Development Trends 71<br/><br/>4.5 Geographic Trends 75<br/><br/>4.6 Industry Trends 78<br/><br/>4.7 Conclusion 80<br/><br/>5 Survey on Building Block Technologies 83<br/><br/>5.1 Motivation 83<br/><br/>5.2 Background 87<br/><br/>5.3 Taxonomy 96<br/><br/>5.4 Supervised Learning Methods 98<br/><br/>5.5 Systematic Literature Review 107<br/><br/>5.6 Evaluation of Supervised Learning Methods 108<br/><br/>5.7 Key Open Problems 125<br/><br/>5.8 Summary 127<br/><br/>6 Behavior-Based Data Exfiltration Detection Methods 141<br/><br/>6.1 Motivation 141<br/><br/>6.2 Existing Methods 144<br/><br/>6.3 Sub-Curve HMM Method 148<br/><br/>6.4 Evaluation 159<br/><br/>6.5 Experimental Results 164<br/><br/>6.6 Discussion 172<br/><br/>6.7 Summary 173<br/><br/>7 Memory-Based Data Exfiltration Detection Methods 181<br/><br/>7.1 Motivation 181<br/><br/>7.2 Existing Methods 183<br/><br/>7.3 Concepts 186<br/><br/>7.4 Fast Lookup Bag-of-Words (FBoW) 191<br/><br/>7.5 Evaluation 199<br/><br/>7.6 Summary 215<br/><br/>8 Temporal-Based Data Exfiltration Detection Methods 221<br/><br/>8.1 Motivation 221<br/><br/>8.2 Existing Methods 223<br/><br/>8.3 Definitions 225<br/><br/>8.4 Temporary Memory Bag-of-Words (TMBoW) 229<br/><br/>8.5 Experimental Results 234<br/><br/>8.6 Summary 245<br/><br/>9 Conclusion 249<br/><br/>9.1 Summary 249<br/><br/>9.2 What Is Innovative in the Described Methods? 251<br/><br/>9.3 What Is Next? 253<br/><br/>Index 255 |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks, raising awareness of the increasing number of attacks each year. Provided with a detailed description of the recent advances in data exfiltration detection methods and technologies, the authors discuss details of data breach countermeasures and attack scenarios to show how the reader may identify a potential cyber attack in the real world. Aimed at professionals and students alike, this book highlights a range of machine learning methods that can be used to detect potential data theft, identifying research gaps and the potential to make change in the future as technology continues to grow. Comprised of eight chapters, this book presents a better understanding of the core issues related to the cyber-attacks as well as the recent methods"-- |
Assigning source |
Provided by publisher. |
545 0# - BIOGRAPHICAL OR HISTORICAL DATA |
Biographical or historical note |
About the Authors<br/>Zahir Tari is Professor at RMIT and Research Director of the RMIT Centre of Cyber Security Research and Innovation.<br/><br/>Nasrin Sohrabi received a PhD in Computer Science from RMIT University, Australia. She is a Postdoctoral Research Fellow in Cloud, Systems and Security discipline, School of Computing Technologies, RMIT University and a core member of the RMIT Centre of Cyber Security Research and Innovation (CCSRI). She has several publications in highly ranked conferences and journals, including ICDE, IEEE Transactions on Services Computings, ACM Computing surveys, IEEE Transactions on Transportation systems, IEEE Transactions on Smart Grids.<br/><br/>Yasaman Samadi is a PhD student in Computer Science at RMIT University, Australia and a researcher in Quantum Cybersecurity. Yasaman has a Master’s in Computer Architecture and worked as a quantum engineer at QBee.<br/><br/>Jakapan Suaboot received his PhD in Cybersecurity from RMIT, Australia. He previously worked as a Lecturer for the Department of Computer Engineering from Prince of Songkla University, Phuket, Thailand. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh90001862 |
General subdivision |
Computer programs. |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh99005296. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh94001277 |
General subdivision |
Computer programs. |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh99005296. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Malware (Computer software) |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh2009005103 |
General subdivision |
Identification |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh2002011456 |
General subdivision |
Computer programs. |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh99005296. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Malware (Computer software) |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh2009005103 |
General subdivision |
Prevention |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh99002416 |
General subdivision |
Computer programs. |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh99005296. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information filtering systems. |
Authority record control number |
https://id.loc.gov/authorities/subjects/sh2007004860. |
655 #4 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Sohrabi, Nasrin, |
Dates associated with a name |
1982- |
Authority record control number |
https://id.loc.gov/authorities/names/n2023008816 |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Samadi, Yasaman, |
Dates associated with a name |
1993- |
Authority record control number |
https://id.loc.gov/authorities/names/n2023008817 |
Relator term |
author. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Suaboot, Jakapan, |
Dates associated with a name |
1984- |
Authority record control number |
https://id.loc.gov/authorities/names/n2023008818 |
Relator term |
author. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900 |
Link text |
Full text is available at Wiley Online Library Click here to view |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|