Predicting Malicious Behavior by Gary M. Jackson
Author:Gary M. Jackson
Language: eng
Format: epub
Publisher: Wiley
Published: 2012-05-23T04:00:00+00:00
There are many other features of signature detection that result in only partial effectiveness at best. It is effective for what it does, but it is not effective enough. If we add the indisputable fact that signature detection is the primary method in use today, it is clear why we have a problem, and why we desperately need a paradigm shift resulting in new technology.
Turning to adversary warfare that is not network based, terrorists are intelligent and have received training on how to avoid detection. This is not a secret—it should be obvious. Of course, much depends on the organization. Hezbollah does repeat many of the same acts, either as terrorist attacks or as acts of insurgency. But, as we have observed, al-Qaeda switches behavior often. We have observed attacks against embassies, the naval ship USS Cole, the World Trade Center, and the Pentagon. There is no real signature to speak of with this group. Therefore, looking for attack signatures with al-Qaeda is fruitless. However, the group does respond to the same antecedent conditions and that has remained the same since its introduction, and predicting responses to antecedent conditions is the basis for AuBA.
Interestingly enough, the predictive accuracy of human behavior is not based on studying the behavior! Many make this mistake. Correlational approaches that associate different behaviors to find patterns are simply missing the fact that behaviors are associated with precursor antecedent and consequence conditions and situations. As someone once said, “Computers don't attack computers, people do.” If we look at people, we must look for antecedents, behavior, motivations, and consequences. Studying behavior alone and correlating behaviors may lead to baselines (normal rates of behaving) but not accurate prediction.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7787)
Grails in Action by Glen Smith Peter Ledbrook(7704)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6622)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6610)
Running Windows Containers on AWS by Marcio Morales(6137)
Kotlin in Action by Dmitry Jemerov(5073)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4947)
Combating Crime on the Dark Web by Nearchos Nearchou(4529)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4422)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4392)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4200)
The Age of Surveillance Capitalism by Shoshana Zuboff(3961)
Python for Security and Networking - Third Edition by José Manuel Ortega(3770)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3434)
Mastering Python for Networking and Security by José Manuel Ortega(3357)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learn Wireshark by Lisa Bock(3314)
Blockchain Basics by Daniel Drescher(3306)
