You are previewing Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security.
O'Reilly logo
Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security

Book Description

A groundbreaking exploration of how to identify and fight security threats at every level

This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates available detection and prediction systems and presents a walkthrough on how to conduct a predictive analysis that highlights proactive security measures.

  • Guides you through the process of predicting malicious behavior, using real world examples and how malicious behavior may be prevented in the future

  • Illustrates ways to understand malicious intent, dissect behavior, and apply the available tools and methods for enhancing security

  • Covers the methodology for predicting malicious behavior, how to apply a predictive methodology, and tools for predicting the likelihood of domestic and global threats

  • CD includes a series of walkthroughs demonstrating how to obtain a predictive analysis and how to use various available tools, including Automated Behavior Analysis

Predicting Malicious Behavior fuses the behavioral and computer sciences to enlighten anyone concerned with security and to aid professionals in keeping our world safer.

Table of Contents

  1. Cover
  2. Part I: Understanding the Dark Side: Malicious Intent
    1. Chapter 1: Analyzing the Malicious Individual
      1. Analyzing the Unique Individual
      2. Richard Reid: The Shoe Bomber
      3. Ted Bundy: The Infamous Serial Murderer
      4. The Individual Cyber Attacker
      5. Modeling the Individual: Advantages and Disadvantages
      6. Advantages of AuBA #1: Automated Summarization
      7. In Summary
    2. Chapter 2: Analyzing the Malicious Group
      1. Understanding the Group Adversary
      2. Analyzing al-Qaeda
      3. Analyzing Hezbollah
      4. Analyzing the Coordinated Group Cyber Threat
      5. Advantages of AuBA #2: Theme-Guided Smart Searches
      6. In Summary
    3. Chapter 3: Analyzing Country-Level Threats
      1. Threats to Our National Infrastructure
      2. Analyzing the Specific Threat of Terrorist Attacks
      3. Improving Network Security
      4. Facing Chemical, Biological, Radiological, and Nuclear (CBRN) Threats
      5. Advantages of AuBA #3: Reducing Errors and Inefficiencies of Manual Predictive Modeling
      6. In Summary
    4. Chapter 4: Threats and Security Nightmares: Our Current Reactive State of Security
      1. Analyzing Mall, School, Workplace, and Other Seemingly Random Public Violence
      2. Unanticipated Terrorist Network Attacks
      3. Can Technology Detect First-Time Attacks?
      4. Advantages of AuBA #4: Building Predictive Applications
      5. In Summary
    5. Chapter 5: Current Network Security
      1. Hacking and National Network Security
      2. Growing Damage and Threat
      3. Assessing Current Technology
      4. Moving Toward Fixing Current Ineffective Network Protection
      5. Envisioning an Effective Future Network Protection Technology
      6. Advantages of AuBA #5: Conducting a Human Behavior Assessment of Threats from Network Packets
      7. In Summary
    6. Chapter 6: Future Threats to Our National Security
      1. Our Growing National Security Dependency on Computers and Networks
      2. Increasing Threat on a Global Basis
      3. The Dire Need for New Proactive Methods
      4. Advantages of AuBA #6: Automated Pattern Classification
      5. In Summary
  3. Part II: Dissecting Malicious Behavior
    1. Chapter 7: Applying Behavior Principles: Predicting Individual Malicious Behavior
      1. Using a Behavior Analysis Methodology That Works
      2. Using Behavior Principles to Analyze Behavior
      3. Environmental Variables
      4. Different Environments, Different Antecedents
      5. Antecedents, Behavior, and Consequences
      6. Behavior Modeling
      7. Advantages of AuBA #7: Incorporating, Refining, and Expanding Behavior Principles for Global Security
      8. In Summary
    2. Chapter 8: Applying Behavior Principles: Predicting Group Malicious Behavior
      1. Analyzing Threat
      2. Group Attempts to Inflict Harm and Damage
      3. Moving from Analysis to Prediction of Malicious Behavior
      4. How Do You Know the Predictive Application Works?
      5. Advantages of AuBA #8: Automating Behavioral and Computer Sciences to Ensure Success
      6. In Summary
    3. Chapter 9: Applying a Predictive Methodology: From Principles to Practice
      1. Construction of Predictive Models
      2. What Is Needed: The Behavioral Methodologies
      3. Making Sure It Works: An Introductory Example
      4. Testing and Use in the Real World: Implications
      5. Advantages of AuBA #9: Designing the Focus of an AuBA-Developed Model
      6. In Summary
    4. Chapter 10: Predicting Domestic Threat
      1. Characterizing Domestic Threat
      2. The Malicious Insider: Spies, Thieves, and Sabotage
      3. Advantages of AuBA #10: Moving from Reactive to Proactive
      4. In Summary
    5. Chapter 11: Computer Networks: Protection from External Threat
      1. Protecting Against Known Attacks: Signature Detection
      2. Identifying Unknown and First-Time Attacks
      3. Forensics: Studying and Defining the Past
      4. Advantages of AuBA #11: Network Intrusion—Converting Digital Information to Human Behavior Assessment
      5. In Summary
    6. Chapter 12: Computer Networks: Protection from Internal Threat
      1. Defining the Insider
      2. Current Trends in Insider Threat Protection
      3. Advantages of AuBA #12: Powerful Predictive Analysis Engines That Fit on a Laptop
      4. In Summary
    7. Chapter 13: Predicting Global Threat
      1. Understanding State-Sponsored Threat
      2. Describing and Identifying Future Global Threat
      3. Understanding the Role of Network Forensics
      4. Determining State Support of Terrorist Activities
      5. Moving from Detection to Protection: A Major Leap
      6. Advantages of AuBA #13: The AuBA Behaviorprint and How It Compares to Signatures
      7. In Summary
  4. Part III: Applying Tools and Methods
    1. Chapter 14: Predictive Capability in Software: Tools for a New Approach
      1. Fusing Computer and Behavioral Sciences
      2. Using the Computer's Speed and Memory to Our Benefit
      3. Human Bias: The Enemy to Accuracy and Analysis
      4. Capturing Cultural Nuances
      5. Moving from Theory to Practice: A Necessary Transition
      6. Advantages of AuBA #14: Incorporating Key Technological Advances
      7. In Summary
    2. Chapter 15: Predictive Behavioral Modeling: Automated Tools of the Trade
      1. Automated Behavior Analysis (AuBA)
      2. ThemeMate
      3. AutoAnalyzer
      4. Using the Advantages of Speed, Accuracy, and Lack of Bias
      5. Conducting Behavioral Modeling: Integrating ThemeMate and AutoAnalyzer
      6. Advantages of AuBA #15: What Is the AuBA Predictive Engine?
      7. In Summary
    3. Chapter 16: Developing AuBA Applications
      1. Modeling from Text Accounts of Past Behavior
      2. Modeling from Sensor Output
      3. Advantages of AuBA #16: Extending Our Analytical Brains
      4. In Summary
    4. Chapter 17: Mastering AuBA Tools for Real-World Use
      1. Predicting the Unpredictable: Identifying Future Malicious Behavior
      2. Advantages of AuBA #17: Versatility
      3. In Summary
    5. Chapter 18: Analyzing Future Malicious Behavior
      1. The Necessity of Context in Predicting Future Behavior
      2. Analyzing the Individual and the Group
      3. Analyzing Threat on a Global Level
      4. Implications for Security
      5. Advantages of AuBA #18: Automated Characterization of Network Attacks
      6. In Summary
  5. Part IV: Predicting Malicious Behavior: Tools and Methods to Support a Paradigm Shift in Security
    1. Chapter 19: AuBA Future Extensions Today
      1. Predicting New Adversary Threat with Enhanced Accuracy
      2. A Behavioral Science–Based Paradigm Shift
      3. Advantages of AuBA #19: AuBA in the Future
      4. In Summary
    2. Chapter 20: How to Predict Malicious Behavior: A Walkthrough
      1. A Manual Walkthrough of AuBA Principles
      2. Moving Beyond the Clinical Setting to Expanded Environments: Automated Assist
      3. Full Automation of the Prediction of Human Behavior: Automated Behavior Analysis
      4. Advantages of AuBA #20: Final Thoughts
      5. In Summary
  6. Foreword
  7. Introduction
  8. Download CD/DVD content