This book provides readers with up-to-date research of emerging cyber
threats and defensive mechanisms, which are timely and essential. It
covers cyber threat intelligence concepts against a range of threat
actors and threat tools (i.e. ransomware) in cutting-edge technologies,
i.e., Internet of Things (IoT), Cloud computing and mobile devices. This
book also provides the technical information on cyber-threat detection
methods required for the researcher and digital forensics experts, in
order to build intelligent automated systems to fight against advanced
cybercrimes.
The ever increasing number of cyber-attacks requires the cyber security
and forensic specialists to detect, analyze and defend against the cyber
threats in almost real-time, and with such a large number of attacks is
not possible without deeply perusing the attack features and taking
corresponding intelligent defensive actions - this in essence defines
cyber threat intelligence notion. However, such intelligence would not
be possible without the aid of artificial intelligence, machine learning
and advanced data mining techniques to collect, analyze, and interpret
cyber-attack campaigns which is covered in this book. This book will
focus on cutting-edge research from both academia and industry, with a
particular emphasis on providing wider knowledge of the field, novelty
of approaches, combination of tools and so forth to perceive reason,
learn and act on a wide range of data collected from different cyber
security and forensics solutions. This book introduces the notion of
cyber threat intelligence and analytics and presents different attempts
in utilizing machine learning and data mining techniques to create
threat feeds for a range of consumers. Moreover, this book sheds light
on existing and emerging trends in the field which could pave the way
for future works.
The inter-disciplinary nature of this book, makes it suitable for a wide
range of audiences with backgrounds in artificial intelligence, cyber
security, forensics, big data and data mining, distributed systems and
computer networks. This would include industry professionals,
advanced-level students and researchers that work within these related
fields.