Data exfiltration threats and prevention techniques : (Record no. 91868)

000 -LEADER
fixed length control field 07000cam a2200517 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250816110101.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250816s2023 njum ob u001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119898870
Qualifying information hardcover
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119898894
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119898897
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119898887
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119898889
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119898900
Qualifying information electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119898900
Qualifying information electronic book
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1372138336
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .T365 2023
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/8
Edition number 23/eng/20230302
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Tari, Zahir,
Dates associated with a name 1961-
Authority record control number https://id.loc.gov/authorities/names/nb99009922
Relator term author.
245 10 - TITLE STATEMENT
Title Data exfiltration threats and prevention techniques :
Remainder of title machine learning and memory-based data security /
Statement of responsibility, etc Zahir Tari, RMIT University, Melbourne, Australia, Nasrin Sohrabi, RMIT University, Melbourne, Australia, Yasaman Samadi, RMIT University, Melbourne, Australia, Jakapan Suaboot, Prince of Songkla University, Phuket, Thailand.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, New Jersey :
Name of publisher, distributor, etc John Wiley & Sons, Inc.,
Date of publication, distribution, etc [2023]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xxiii, 260 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent.
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier.
340 ## - PHYSICAL MEDIUM
Source rdacc
Authority record control number or standard number http://rdaregistry.info/termList/RDAColourContent/1003.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - CONTENTS
Formatted contents note Table of Contents<br/>About the Authors xv<br/><br/>Acknowledgments xvii<br/><br/>Acronyms xix<br/><br/>Abstract xxi<br/><br/>1 Introduction 1<br/><br/>1.1 Data Exfiltration Methods 3<br/><br/>1.2 Important Questions 7<br/><br/>1.3 Book Scope 9<br/><br/>1.4 Book Summary 11<br/><br/>1.5 Book Structure 15<br/><br/>2 Background19<br/><br/>2.1 Hidden Markov Model 19<br/><br/>2.2 Memory Forensics 24<br/><br/>2.3 Bag-of-Words Model 27<br/><br/>2.4 Sparse Distributed Representation 28<br/><br/>2.5 Summary 29<br/><br/>3 Data Security Threats 31<br/><br/>3.1 Data Security 32<br/><br/>3.2 Security vs. Protection vs. Privacy 35<br/><br/>3.3 Advanced Persistent Threats Attacks 36<br/><br/>3.4 Cybersecurity Threats 38<br/><br/>3.5 Conclusion 59<br/><br/>4 Use Cases Data Leakage Attacks 63<br/><br/>4.1 Most Significant Attacks 63<br/><br/>4.2 Top Infection Vectors 68<br/><br/>4.3 Top Threats of Recent Years 70<br/><br/>4.4 Malware Development Trends 71<br/><br/>4.5 Geographic Trends 75<br/><br/>4.6 Industry Trends 78<br/><br/>4.7 Conclusion 80<br/><br/>5 Survey on Building Block Technologies 83<br/><br/>5.1 Motivation 83<br/><br/>5.2 Background 87<br/><br/>5.3 Taxonomy 96<br/><br/>5.4 Supervised Learning Methods 98<br/><br/>5.5 Systematic Literature Review 107<br/><br/>5.6 Evaluation of Supervised Learning Methods 108<br/><br/>5.7 Key Open Problems 125<br/><br/>5.8 Summary 127<br/><br/>6 Behavior-Based Data Exfiltration Detection Methods 141<br/><br/>6.1 Motivation 141<br/><br/>6.2 Existing Methods 144<br/><br/>6.3 Sub-Curve HMM Method 148<br/><br/>6.4 Evaluation 159<br/><br/>6.5 Experimental Results 164<br/><br/>6.6 Discussion 172<br/><br/>6.7 Summary 173<br/><br/>7 Memory-Based Data Exfiltration Detection Methods 181<br/><br/>7.1 Motivation 181<br/><br/>7.2 Existing Methods 183<br/><br/>7.3 Concepts 186<br/><br/>7.4 Fast Lookup Bag-of-Words (FBoW) 191<br/><br/>7.5 Evaluation 199<br/><br/>7.6 Summary 215<br/><br/>8 Temporal-Based Data Exfiltration Detection Methods 221<br/><br/>8.1 Motivation 221<br/><br/>8.2 Existing Methods 223<br/><br/>8.3 Definitions 225<br/><br/>8.4 Temporary Memory Bag-of-Words (TMBoW) 229<br/><br/>8.5 Experimental Results 234<br/><br/>8.6 Summary 245<br/><br/>9 Conclusion 249<br/><br/>9.1 Summary 249<br/><br/>9.2 What Is Innovative in the Described Methods? 251<br/><br/>9.3 What Is Next? 253<br/><br/>Index 255
520 ## - SUMMARY, ETC.
Summary, etc "Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks, raising awareness of the increasing number of attacks each year. Provided with a detailed description of the recent advances in data exfiltration detection methods and technologies, the authors discuss details of data breach countermeasures and attack scenarios to show how the reader may identify a potential cyber attack in the real world. Aimed at professionals and students alike, this book highlights a range of machine learning methods that can be used to detect potential data theft, identifying research gaps and the potential to make change in the future as technology continues to grow. Comprised of eight chapters, this book presents a better understanding of the core issues related to the cyber-attacks as well as the recent methods"--
Assigning source Provided by publisher.
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note About the Authors<br/>Zahir Tari is Professor at RMIT and Research Director of the RMIT Centre of Cyber Security Research and Innovation.<br/><br/>Nasrin Sohrabi received a PhD in Computer Science from RMIT University, Australia. She is a Postdoctoral Research Fellow in Cloud, Systems and Security discipline, School of Computing Technologies, RMIT University and a core member of the RMIT Centre of Cyber Security Research and Innovation (CCSRI). She has several publications in highly ranked conferences and journals, including ICDE, IEEE Transactions on Services Computings, ACM Computing surveys, IEEE Transactions on Transportation systems, IEEE Transactions on Smart Grids.<br/><br/>Yasaman Samadi is a PhD student in Computer Science at RMIT University, Australia and a researcher in Quantum Cybersecurity. Yasaman has a Master’s in Computer Architecture and worked as a quantum engineer at QBee.<br/><br/>Jakapan Suaboot received his PhD in Cybersecurity from RMIT, Australia. He previously worked as a Lecturer for the Department of Computer Engineering from Prince of Songkla University, Phuket, Thailand.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Authority record control number https://id.loc.gov/authorities/subjects/sh90001862
General subdivision Computer programs.
Authority record control number https://id.loc.gov/authorities/subjects/sh99005296.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Authority record control number https://id.loc.gov/authorities/subjects/sh94001277
General subdivision Computer programs.
Authority record control number https://id.loc.gov/authorities/subjects/sh99005296.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Malware (Computer software)
Authority record control number https://id.loc.gov/authorities/subjects/sh2009005103
General subdivision Identification
Authority record control number https://id.loc.gov/authorities/subjects/sh2002011456
General subdivision Computer programs.
Authority record control number https://id.loc.gov/authorities/subjects/sh99005296.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Malware (Computer software)
Authority record control number https://id.loc.gov/authorities/subjects/sh2009005103
General subdivision Prevention
Authority record control number https://id.loc.gov/authorities/subjects/sh99002416
General subdivision Computer programs.
Authority record control number https://id.loc.gov/authorities/subjects/sh99005296.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information filtering systems.
Authority record control number https://id.loc.gov/authorities/subjects/sh2007004860.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sohrabi, Nasrin,
Dates associated with a name 1982-
Authority record control number https://id.loc.gov/authorities/names/n2023008816
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Samadi, Yasaman,
Dates associated with a name 1993-
Authority record control number https://id.loc.gov/authorities/names/n2023008817
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Suaboot, Jakapan,
Dates associated with a name 1984-
Authority record control number https://id.loc.gov/authorities/names/n2023008818
Relator term author.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900
Link text Full text is available at Wiley Online Library Click here to view
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Full call number Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2025-08-16 ALBASA Consortium 005.8/8 2025-08-16 2025-08-16 EBOOK