Antivirus software uses algorithms to detect viruses Reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud framework, and the applications for insider threat detection.
Supporting Technologies. Introduction. Data Mining Techniques. Cyber Security and Malware. Data Mining for Malware Detection. Conclusion. Stream-Based Novel Class Detection. Stream Mining. Novel Class Detection Problem. SNOD. Conclusion. Reactively Adaptive Malware. Reactively Adaptive Malware. RAMAL Design. RAMAL Implementation. SNODMAL. Introduction. SNODMAL Design. SNODMAL Implementation. SNODMAL FOR RAMAL. SNODMAL Extensions. Introduction. SNODMAL on the Cloud. SNODCAL. SNODMAL++. Conclusion. Summary and Directions. References. Appendix A: Data Management Systems. Appendix B: Malware Products.