Book description
Today AI and Machine/Deep Learning have become the hottest areas in the information technology. This book aims to provide a complete picture on the challenges and solutions to the security issues in various applications. It explains how different attacks can occur in advanced AI tools and the challenges of overcoming those attacks.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Preface
- About the Editors
- Contributors
-
Part I Secure AI/ML Systems: Attack Models
- 1 Machine Learning Attack Models
- 2 Adversarial Machine Learning: A New Threat Paradigm for Next-generation Wireless Communications
- 3 Threat of Adversarial Attacks to Deep Learning: A Survey
- 4 Attack Models for Collaborative Deep Learning
- 5 Attacks on Deep Reinforcement Learning Systems: A Tutorial
- 6 Trust and Security of Deep Reinforcement Learning
- 7 IoT Threat Modeling Using Bayesian Networks
-
Part II Secure AI/ML Systems: Defenses
- 8 Survey of Machine Learning Defense Strategies
- 9 Defenses Against Deep Learning Attacks
- 10 Defensive Schemes for Cyber Security of Deep Reinforcement Learning
- 11 Adversarial Attacks on Machine Learning Models in Cyber- Physical Systems
- 12 Federated Learning and Blockchain: An Opportunity for Artificial Intelligence with Data Regulation
-
Part III Using AI/ML Algorithms for Cyber Security
-
13 Using Machine Learning for Cyber Security: Overview
- 13.1 Introduction
- 13.2 Is artificial intelligence enough to stop cyber crime?
- 13.3 Corporations’ use of machine learning to strengthen their cyber security systems
-
13.4 Cyber attack/cyber security threats and attacks
- 13.4.1 Malware
- 13.4.2 Data Breach
- 13.4.3 Structured Query Language Injection (SQL-i)
- 13.4.4 Cross-site Scripting (XSS)
- 13.4.5 Denial-of-service (DOS) Attack
- 13.4.6 Insider Threats
- 13.4.7 Birthday Attack
- 13.4.8 Network Intrusions
- 13.4.9 Impersonation Attacks
- 13.4.10 DDoS Attacks Detection on Online Systems
- 13.5 Different machine learning techniques in cyber security
- 13.6 Application of machine learning
- 13.7 Deep learning techniques in cyber security
- 13.8 Applications of deep learning in cyber security
- 13.9 Conclusion
- References
-
14 Performance of Machine Learning and Big Data Analytics Paradigms in Cyber Security
- 14.1 Introduction
-
14.2 Literature review
- 14.2.1 Overview
- 14.2.2 Classical Machine Learning (CML)
- 14.2.3 Modern Machine Learning
-
14.2.4 Big Data Analytics and Cyber Security
- 14.2.4.1 Big Data Analytics Issues
- 14.2.4.2 Independent Variable: Big Data Analytics
- 14.2.4.3 Intermediating Variables
- 14.2.4.4 Conceptual Framework
- 14.2.4.5 Theoretical Framework
- 14.2.4.6 Big Data Analytics Application to Cyber Security
- 14.2.4.7 Big Data Analytics and Cyber Security Limitations
- 14.2.4.8 Limitations
- 14.2.5 Advances in Cloud Computing
- 14.2.6 Cloud Characteristics
- 14.2.7 Cloud Computing Service Models
-
14.2.8 Cloud Deployment Models
- 14.2.8.1 Private Cloud
- 14.2.8.2 Public Cloud
- 14.2.8.3 Hybrid Cloud
- 14.2.8.4 Community Cloud
- 14.2.8.5 Advantages and Disadvantages of Cloud Computing
- 14.2.8.6 Six Main Characteristics of Cloud Computing and How They Are Leveraged
- 14.2.8.7 Some Advantages of Network Function Virtualization
- 14.2.8.8 Virtualization and Containerization Compared and Contrasted
- 14.3 Research methodology
-
14.4 Analysis and research outcomes
- 14.4.1 Overview
- 14.4.2 Support Vector Machine
- 14.4.3 KNN Algorithm
- 14.4.4 Multilinear Discriminant Analysis (LDA)
- 14.4.5 Random Forest Classifier
- 14.4.6 Variable Importance
- 14.4.7 Model Results
- 14.4.8 Classification and Regression Trees (CART)
- 14.4.9 Support Vector Machine
- 14.4.10 Linear Discriminant Algorithm
- 14.4.11 K-Nearest Neighbor
- 14.4.12 Random Forest
- 14.4.13 Challenges and Future Direction
- 14.5 Conclusion
- References
- 15 Using ML and DL Algorithms for Intrusion Detection in the Industrial Internet of Things
-
13 Using Machine Learning for Cyber Security: Overview
-
Part IV Applications
-
16 On Detecting Interest Flooding Attacks in Named Data Networking (NDN)–based IoT Searches
- 16.1 Introduction
- 16.2 Preliminaries
- 16.3 Machine learning assisted for ndn-based ifa detection in iotse
- 16.4 Performance evaluation
- 16.5 Discussion
- 16.6 Related works
- 16.7 Final remarks
- Acknowledgment
- References
- 17 Attack on Fraud Detection Systems in Online Banking Using Generative Adversarial Networks
-
18 Artificial Intelligence-assisted Security Analysis of Smart Healthcare Systems
- 18.1 Introduction
- 18.2 Smart healthcare system (shs)
- 18.3 Formal attack modeling of shs
- 18.4 Anomaly detection models (adms) in shs
- 18.5 Formal attack analysis of smart healthcare systems
- 18.6 Resiliency analysis of smart healthcare system
- 18.7 Conclusion and future works
- References
- 19 A User-centric Focus for Detecting Phishing Emails
-
16 On Detecting Interest Flooding Attacks in Named Data Networking (NDN)–based IoT Searches
Product information
- Title: AI, Machine Learning and Deep Learning
- Author(s):
- Release date: June 2023
- Publisher(s): CRC Press
- ISBN: 9781000878899
You might also like
book
Machine Learning Bookcamp
Time to flex your machine learning muscles! Take on the carefully designed challenges of the Machine …
book
Machine Learning
Machine Learning: A Constraint-Based Approach provides readers with a refreshing look at the basic models and …
book
Machine Learning
"Table of Contents: 1 Introduction to Machine Learning 2 Preparing to Model 3 Modelling and Evaluation …
book
Deep Learning
Ever since computers began beating us at chess, they've been getting better at a wide range …