All Projects → LeoTsui → CS259D_Notes_HW_cn

LeoTsui / CS259D_Notes_HW_cn

Licence: MIT license
本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。

Projects that are alternatives of or similar to CS259D Notes HW cn

Awesome Ml For Cybersecurity
Machine Learning for Cyber Security
Stars: ✭ 4,814 (+7541.27%)
Mutual labels:  data-mining, cyber-security
dayder
Search lots of data sets for spurious correlations
Stars: ✭ 44 (-30.16%)
Mutual labels:  data-mining
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+38.1%)
Mutual labels:  cyber-security
Network-Embedding-Resources
Network Embedding Survey and Resources
Stars: ✭ 43 (-31.75%)
Mutual labels:  data-mining
sql-cookbook
Common SQL recipes and best practises
Stars: ✭ 68 (+7.94%)
Mutual labels:  data-mining
kmeans
A simple implementation of K-means (and Bisecting K-means) clustering algorithm in Python
Stars: ✭ 18 (-71.43%)
Mutual labels:  data-mining
SwitHak.github.io
SwitHak' Security Place for my Opinions and Work
Stars: ✭ 30 (-52.38%)
Mutual labels:  cyber-security
taller SparkR
Taller SparkR para las Jornadas de Usuarios de R
Stars: ✭ 12 (-80.95%)
Mutual labels:  data-mining
cyber-matrix-ai
Collection of cyber security and "AI" relevant topics
Stars: ✭ 69 (+9.52%)
Mutual labels:  cyber-security
robot hacking manual
Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+168.25%)
Mutual labels:  cyber-security
BLUELAY
Searches online paste sites for certain search terms which can indicate a possible data breach.
Stars: ✭ 24 (-61.9%)
Mutual labels:  data-mining
Hefei ECG TOP1
“合肥高新杯”心电人机智能大赛 —— 心电异常事件预测 TOP1 Solution
Stars: ✭ 109 (+73.02%)
Mutual labels:  data-mining
4chanMarkovText
Text Generation using Markov Chains fed by 4chan APIs
Stars: ✭ 28 (-55.56%)
Mutual labels:  data-mining
csmath-2021
This mathematics course is taught for the first year Ph.D. students of computer science and related areas @zju
Stars: ✭ 30 (-52.38%)
Mutual labels:  data-mining
hpipe
Workflow engine for various computing systems.
Stars: ✭ 26 (-58.73%)
Mutual labels:  data-mining
emperor-os
(new released v2.5 LTS.2022-06-25) It has focused on developing an All in One operating system for programming, designing and data science.Emperor-OS has over 500 apps and important tools
Stars: ✭ 32 (-49.21%)
Mutual labels:  data-mining
machine learning in python
Demo of basic machine learning models in python with Jupter Notebook
Stars: ✭ 16 (-74.6%)
Mutual labels:  data-mining
pathpy
pathpy is an OpenSource python package for the modeling and analysis of pathways and temporal networks using higher-order and multi-order graphical models
Stars: ✭ 124 (+96.83%)
Mutual labels:  data-mining
Instagram-Comments-Scraper
Instagram comment scraper using python and selenium. Save the comments into excel.
Stars: ✭ 73 (+15.87%)
Mutual labels:  data-mining
VirusX5
The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-76.19%)
Mutual labels:  cyber-security

CS 259D 《数据挖掘与网络安全》笔记说明

本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。如无特别说明,所有图表均引用自原始论文和幻灯片。

中文:Github GitBook English: GitHub GitBook


课程内容

介绍

  • 信息安全概述,当前的安全形势,安全领域数据挖掘案例

僵尸网络

  • 僵尸网络拓扑结构, 使用 NetFlow 检测僵尸网络
    • Lecture 2
    • BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection
    • BotFinder: Finding Bots in Network Traffic Without Deep Packet Inspection
  • 使用 DNS 检测僵尸网络
    • Lecture 3
    • EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis (2011)

内部威胁

  • 内部威胁简介,伪装检测策略
    • Lecture 3
    • One-class Training for Masquerade Detection (2003)

生物行为统计信息

  • 基于行为和认知生物特征的主动认证
    • Lecture 4
    • An examination of user behavior for re-authentication (M. Pusara's PhD thesis,2007)
  • 基于鼠标动态信息分析的主动认证
    • Lecture 5
    • Continuous authentication for mouse dynamics: A pattern-growth approach (Shen C, Cai Z, Guan X. 2012)
    • Lecture 7
    • An Efficient User Verification System via Mouse Movements, 2011
  • 基于触摸和滑动模式分析的移动端主动认证
    • Lecture 7
    • Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication, 2013

网络安全

  • 基于Web服务器日志分析的Web威胁检测
    • Lecture 8
    • A multi-model approach to the detection of web-based attacks, 2005
  • 网络安全警报聚类
    • Lecture 12
    • Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks, Robertson et al., 2006

网络钓鱼检测

  • 钓鱼邮件和钓鱼网站检测
    • Lecture 16
    • Learning to Detect Phishing Emails, Fette et al, 2007
    • Cantina: A content-based approach to detecting phishing websites, Zhang et al, 2007

入侵检测系统(IDS)

  • 关联单个警报,构建攻击流程
    • Lecture 20
    • A Comprehensive Approach to Intrusion Detection Alert Correlation, Valeur et al, 2004
  • 多分类系统(MCS)概述,MCS在安全分析中的优势
    • Lecture 10
    • Adaptive Intrusion Detection System via Online Learning, 2012

深度包检测

  • 基于数据包载荷建模的网络入侵检测
    • Lecture 12
    • PAYL: Anomalous payload-based network intrusion detection, Wang-Stolfo 2004
  • 把多个 One-class 分类器用于数据包有效载荷建模和网络检测
    • Lecture 15
    • McPAD : A Multiple Classifier System for Accurate Payload-based Anomaly Detection, Perdisci et al, 2009

多态攻击

  • 多态混合攻击,无法为多态攻击建模
    • Lecture 14
    • Polymorphic Blending Attacks, Fogla et al, 2006
    • On the Infeasibility of Modeling Polymorphic Shellcode, Song et al, 2007

在安全领域使用机器学习

  • 在安全领域使用机器学习的挑战与实践指导
    • Lecture 13
    • Outside the closed world: On using machine learning for network intrusion detection, Sommer-Paxson, 2010
    • Challenging the Anomaly Detection Paradigm: A Provocative Discussion, Gates-Taylor, 2007
    • The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection, Axelsson, 1999

机器学习对抗性攻击

  • 机器学习的安全问题
    • Lecture 10
    • The security of machine learning, 2010

工业界做客讲座报告

  • Wells Fargo
    • Lecture 6
    • Guest speaker Avi Avivi, VP Enterprise Information Security Architecture at Wells Fargo
  • Union Bank
    • Lecture 9
    • Guest speaker Gary Lorenz, Chief Information Security Officer (CISO) and Managing Director at MUFG Union Bank
  • 安全数据挖掘在Google(流传较广的报告)
    • Lecture 11
    • Guest speaker Massimiliano Poletto, head of Google Security Monitoring Tools group
  • Industry Perspectives
    • Q&A with guest speaker Michael Fey, EVP and CTO of Intel Security Group (aka McAfee)

作业

作业1

  • 作业 1. 僵尸网络
  • 作业 2. Anomaly Detection via "Eigenface" of Command History
  • 作业 3. Continuous Authentication via Biometric Behavior

作业2

  • 作业 1. 测验
  • 作业 2. 触摸信息识别
  • 作业 3. 熵在攻击检测/诊断中的使用

作业3

  • 电子邮件抓包分析

作业4

  • 测验
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].