Preface.
1. Why Machine Learning and Security?
Cyber Threat Landscape
The Cyber Attacker's Economy
A Marketplace for Hacking Skills
Indirect Monetization
The Upshot
What Is Machine Learning?
What Machine Learning Is Not
Adversaries Using Machine Learning
Real-World Uses of Machine Learning in Security
Spam Fighting: An Iterative Approach
Limitations of Machine Learning in Security
2. Classifying and Clustering
Machine Learning: Problems and Approaches
Machine Learning in Practice: A Worked Example
Training Algorithms to Learn
Model Families
Loss Functions
Optimization
Supervised Classification Algorithms
Logistic Regression
Decision Trees
Decision Forests
Support Vector Machines
Naive Bayes
k-Nearest Neighbors
Neural Networks
Practical Considerations in Classification
Selecting a Model Family
Training Data Construction
Feature Selection
Overfitting and Underfitting
Choosing Thresholds and Comparing Models
Clustering
Clustering Algorithms
Evaluating Clustering Results
Conclusion
3.Anomaly Detection
When to Use Anomaly Detection Versus Supervised Learning
Intrusion Detection with Heuristics
Data-Driven Methods
Feature Engineering for Anomaly Detection
Host Intrusion Detection
Network Intrusion Detection
Web Application Intrusion Detection
In Summary
Anomaly Detection with Data and Algorithms
Forecasting (Supervised Machine Learning)
Statistical Metrics