Security, and Intelligence



Similar documents
Ctfo MANAGEMENT SECURITY PATCH. Felicia M. Nicastro. Second Edition. CRC Press. VC#*' J Taylor & Francis Group / Boca Raton London New York

Development and Management

Improving Business Process Performance

Advances in Network Management

Management. ITIL Release. Dave Howard. A Hands-on Guide. CRC Press. Taylor & Francis Group. Taylor St Francis Croup, an Informa business

Customer and Business Analytic

RESILIENT. SECURE and SOFTWARE. Requirements, Test Cases, and Testing Methods. Mark S. Merkow and Lakshmikanth Raghavan. CRC Press

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York

THE COMPLETE PROJECT MANAGEMENT METHODOLOGY AND TOOLKIT

Warning Signs and the Red Flag System

Mining. Practical. Data. Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press. Taylor & Francis Group

QRadar SIEM and Zscaler Nanolog Streaming Service

Implementing the Project Management Balanced Scorecard

IBM QRadar Security Intelligence April 2013

Supply Chain Risk. An Emerging Discipline. Gregory L. Schlegel. Robert J. Trent

SOFTWARE TESTING AS A SERVICE

The Geography of International terrorism

Lean Management System LMS:2OI2

Middle Class Economics: Cybersecurity Updated August 7, 2015

Computer Security Literacy

in Business Technology Management

SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL

Introduction to Supply Chain Management Technologies

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business

Pre-Crime Data Mining 1.1 Behavioral Profiling

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

CREATING A THIRD EDITION DAVID MANN

Security Intelligence

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, p i.

Nine Common Types of Data Mining Techniques Used in Predictive Analytics

CHAPMAN & HALL/CRC INNOVATIONS IN SOFTWARE ENGINEERING AND SOFTWARE DEVELOPMENT. Software Test Attacks to Break Mobile and Embedded Devices

THE EVOLUTION OF SIEM

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Deliuery Networks. A Practical Guide to Content. Gilbert Held. Second Edition. CRC Press. Taylor & Francis Group

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Study Guide. ScrumMaster. The. James Schiel. CRC Press. Taylor & Francis Croup, an Inform* business AN AUERBACH BOOK. CRC Press (s an imprint of the

Requirements When Considering a Next- Generation Firewall

Engineering Design. Software. Theory and Practice. Carlos E. Otero. CRC Press. Taylor & Francis Croup. Taylor St Francis Croup, an Informa business

CISO's Guide to. Penetration Testing. James. S. Tiller. A Framework to Plan, Manage, and Maximize Benefits. CRC Press. Taylor & Francis Group

Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir.

TOYOTA. by TOYOTA. Reflections from the Inside Leaders on the Techniques That Revolutionized the Industry. Edited by Samuel Obara and Darril Wilburn

Management. Project. Software. Ashfaque Ahmed. A Process-Driven Approach. CRC Press. Taylor Si Francis Group Boca Raton London New York

Information Technology and Organizational Learning

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Analyzing Huge Data Sets in Forensic Investigations

The Cyber Threat Profiler

Governance Simplified

The Green and Virtual Data Center

On A Network Forensics Model For Information Security

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 420 THE CORPORATE ROLE IN HOMELAND SECURITY

Quality Management. Theory and Application PETER D. MAUCH. Ltfi) CRC Press. \ V J Taylor & Francis Group. ^ ^ Boca Raton London New York

RAVEN, Network Security and Health for the Enterprise

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

QRadar SIEM and FireEye MPS Integration

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Federal Bureau of Investigation s Integrity and Compliance Program

Security Intelligence Services. Cybersecurity training.

INFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press

BUSINESS ANALYSIS FDR INTELLIGENCE

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Extreme Networks: A SOLUTION WHITE PAPER

The Comprehensive National Cybersecurity Initiative

BIOTECHNOLOGY OPERATIONS

Networking. Cloud and Virtual. Data Storage. Greg Schulz. Your journey. effective information services. to efficient and.

Fraud Solution for Financial Services

Continuous Network Monitoring

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Overcoming Five Critical Cybersecurity Gaps

Report on CAP Cybersecurity November 5, 2015

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

LEVERAGING BIG DATA ANALYTICS TO REDUCE SECURITY INCIDENTS A use case in Finance Sector

Cloud Computing. Implementation, Management, and Security. John W. Rittinghouse James F. Ransome

A New Era Of Analytic

Bellevue University Cybersecurity Programs & Courses

Requirements Engineering for Software

Implementation. Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Andrew T. Pham and David K. Pham. An Action Guide for Business and IT Leaders

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

EFFECTIVE NON-PROFIT MANAGEMENT

InfoSec Academy Forensics Track

Optimizing Case Management with Predictive Tax Compliance

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Can We Become Resilient to Cyber Attacks?

(Instructor-led; 3 Days)

SAS Fraud Framework for Banking

for Information Technology

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

HIPAA NOTICE TO PATIENTS

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Big Data and Analytics in Government

SURVEY OF INTRUSION DETECTION SYSTEM

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA

BOARD OF GOVERNORS MEETING JUNE 25, 2014

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Transcription:

Machine Learning Forensics for Law Enforcement, Security, and Intelligence Jesus Mena CRC Press Taylor &. Francis Group Boca Raton London NewYork CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK

Contents Introduction The Author ix xi Chapter 1 What Is Machine Learning Forensics? 1 1.1 Definition 1 1.2 Digital Maps and Models: Strategies and Technologies 2 1.3 Extractive Forensics: Link Analysis and Text Mining 3 1.4 Inductive Forensics: Clustering Incidents and Crimes 7 1.5 Deductive Forensics: Anticipating Attacks and Precrimc 10 1.6 Fraud Detection: On the Web, Wireless, and in Real Time 21 1.7 Cybersecurity Investigations: Self-Organizing and Evolving Analyses 24 1.8 Corporate Counterintelligence: Litigation and Competitive Investigations 28 1.9 A Machine Learning Forensic Worksheet 32 Chapter 2 Digital Investigative Maps and Models: Strategies and Techniques 37 2.1 Forensic Strategies 37 2.2 Decompose 2.3 Criminal Data Sets, Reports, the Data 41 and Networks 42 2.4 Real Estate, Auto, and Credit Data Sets 45 2.5 Psychographic and Demographic Data Sets 46 2.6 Internet Data Sets 49 2.7 Deep Packet Inspection (DPI) 53 V

VI CONTENTS 2.8 Designing a Forensic Framework 56 2.9 Tracking Mechanisms 58 2.10 Assembling Data Streams 63 2.11 Forensic Techniques 65 2.12 Investigative Maps 69 2.13 Investigative Models 72 Chapter 3 Extractive Forensics: Link Analysis and Text Mining 77 3.1 Data Extraction 77 3.2 Link Analysis 80 3.3 Link Analysis Tools 83 3.4 Text Mining 96 3.5 Text Mining Tools 98 3.5.1 Online Text Mining Analytics Tools 99 3.5.2 Commercial Text Mining Analytics Software 99 3.6 From Extraction to Clustering 123 Chapter 4 Inductive Forensics: Clustering Incidents and Crimes 125 4.1 Autonomous Forensics 125 4.2 Self-Organizing Maps 129 4.3 Clustering Software 132 4.3.1 Commercial Clustering Software 132 4.3.2 Free and Open-Source Clustering Software 134 4.4 Mapping Incidents 138 4.5 Clustering Crimes 141 4.6 From Induction to Deduction 154 Chapter 5 Deductive Forensics: Anticipating Attacks and Precrime 159 5.1 Artificial Intelligence and Machine Learning 159 5.2 Decision Trees 160 5.3 Decision Tree Techniques 163 5.4 Rule Generators 167 5.5 Decision Tree Tools 170 5.5.1 Free and Shareware Decision Tree Tools 179 5.5.2 Rule Generator Tools 179 5.5.3 Free Rule Generator Tools 182 5.6 The Streaming Analytical Forensic Processes 184 5.7 Forensic Analysis of Streaming Behaviors 190 5.8 Forensic Real-Time Modeling 191 5.9 Deductive Forensics for Precrime 192 Chapter 6 Fraud Detection: On the Web, Wireless, and in Real Time 195 6.1 Definition and Techniques: Where, Who, and How 195 6.2 The Interviews: The Owners, Victims, and Suspects 202

CONTENTS VII 6.3 Hie S cene of the Crime: Search for Digital Evidence 6.3.1 Four Key Steps in Dealing with Digital Evidence 6.4 Searches for Associations: Discovering Links and 205 206 Text Concepts 207 6.5 Rules offraud: Conditions and Clues 208 6.6 A Forensic Investigation Methodology 209 6.6.1 Step One: Understand the Investigation Objective 209 6.6.2 Step Two: Understand the Data 210 6.6.3 Step Three: Data Preparation Strategy 210 6.6.4 Step Four: Forensic Modeling 210 6.6.5 Step Five: Investigation Evaluation 211 6.6.6 Step Six: Detection Deployment 211 6.7 Forensic Ensemble Techniques 212 6.7.1 Stage One: Random Sampling 212 6.7.2 Stage Two: Balance the Data 213 6.7.3 Stage Three: Split the Data 213 6.7.4 Stage Four: Rotate the Data 213 Models 213 6.7.5 Stage Five: Evaluate Multiple 6.7.6 Stage Six: Create an Ensemble Model 214 6.7.7 Stage Seven: Measure False Positives and Negatives 215 6.7.8 Stage Eight: Deploy and Monitor 215 6.7.9 Stage Nine: Anomaly Detection 216 6.8 Fraud Detection Forensic Solutions 216 6.9 Assembling an Evolving Fraud Detection Framework 227 Chapter 7 Cybersecurity Investigations: Self- Organizing and Evolving Analyses 233 7.1 What Is Cybersecurity Forensics? 233 7.2 Cybersecurity and Risk 234 7.3 Machine Learning Forensics for Cybersecurity 236 7.4 Deep Packet Inspection (DPI) 239 7.4.1 Layer 7: Application 239 7.4.2 Layer 6: Presentation 240 7.4.3 Layer 5: Session 240 7.4.4 Layer 4: Transport 240 7.4.5 Layer 3: Network 241 7.4.6 Layer 2: Data Link 241 7.4.7 Layer 1: Physical 241 7.4.8 Software Tools Using DPI 241 7.5 Network Security Tools 242 7.6 Combating Phishing 245 7.7 Hostile Code 247 7.8 The Foreign Threat 250 7.8.1 The CNCI Initiative Details 252

VI11 CONTENTS 7.9 Forensic Investigator Toolkit 256 7.10 Wireless Hacks 259 7.11 Incident Response Check-Off Checklists 263 7.12 Digital Fingerprinting 267 Chapter 8 Corporate Counterintelligence: Litigation and Competitive Investigations 271 8.1 Corporate Counterintelligence 271 8.2 Ratio, Trending, and Anomaly Analyses 274 8.3 E-Mail Investigations 276 8.4 Legal Risk Assessment Audit 283 8.4.2 Inventory of External Inputs to the Process 285 8.4.3 Identify Assets and Threats 286 8.4.4 List Risk Tolerance for Major Events 286 8.4.5 List and Evaluate Existing Protection Mechanisms 287 8.4.6 List and Assess Underprotected Assets and Unaddressed Threats 287 8.5 Competitive Intelligence Investigations 292 8.5 Triangulation Investigations 302 Index 307