Book Review: Malware Data Science

Viewing 6 reply threads
  • Author
    • #169299

      [caption id="attachment_169289" align="alignright" width="500"]EH-Net - Book Review - Malware Data Science - Neural Net Learning Neural Network Learning Malware vs Benignware[/caption]

      Malware Data Science: Attack Detection and Attribution” (MDS) is a book every information security professional should consider reading due to the rapid growth and variation of malware and the increasing reliance upon data science to defend information systems. Known malware executables have expanded from 1 million in 2008 to more than 700 million in 2018. Intrusion Detection Systems (IDS) are changing from signature-based systems as code packing, encryption, dynamic linking and obfuscation point security towards tools applying heuristics methods supported by data science. This article is a summary and a review, but my primary goal is to encourage the reader to read the book and complete the activities. If you do, I am sure that your security toolkit will be better equipped.

      Overview of Malware Data Science

      MDS identifies Data Science as a growing set of algorithmic tools that allow us to understand and make predictions about data using statistics, mathematics, and artful statistical data visualizations. While these terms may imply a difficult read, authors Joshua Saxe (Chief Data Scientist at Sophos) and Hillary Sanders (Infrastructure Data Science Team Lead at Sophos) equip the reader for upcoming concepts well, building upon key concepts with python code examples and walking through the code to reinforce learning. At points they identify additional resources or refer to prior chapters in a way that both supports the reader and encourages further study.

      EH-Net - Book Review - Malware Data ScienceThe code is downloadable from a site dedicated to MDS. Executing the code as you read helps to learn the concepts. I found working directly with the code itself to be surprisingly encouraging and even fun. Of course, some of the code is malware obtained from VirusTotal or Kaspersky Labs. That code is de-fanged with some flipped bits, but the code should be treated with due care in VirtualBox. The text offers a provisioned VirtualBox download.

      [See the full article at: Book Review: Malware Data Science]

    • #169317

      The is a link to a security company that is applying some of these security principles, and I believe an example of where the industry is heading.

      • This reply was modified 3 years, 2 months ago by MTGreen.
    • #182449

      Such a great help info. I’ll check out that link. Just visit us today.

    • #182580

      Neural networks can be used for feature extraction, which could be applied to anything from facial recognition to malware detection.

      Robert | Bathroom Remodeling Tacoma

    • #182941

      It*s actually a pretty good book. Malware Data Science is a subject worth investigating.

    • #182971

      You will need math. Don’t start out by trying to limit what you might need. Swallow and digest as much as you can. The better you are at math, the better a data scientist you will be. See, below for a more constructive answer.

    • #183768

      Instagram Downloader

      A tool to save videos and photos from Instagram, you can use this tool on any phone or computer through your browser.

      • This reply was modified 1 month, 1 week ago by wellyselly.
Viewing 6 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.


Sign in with Caendra

Forgot password?Sign up

Forgot your details?