AI for Cybersecurity: A Handbook of Use Cases

View the Project on GitHub

By Peng Liu, Tao Liu, Nanqing Luo, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, and Qingtian Zou From Penn State Cybersecurity Lab.

How to cite

@book{aisecurity,
  title={AI for Cybersecurity: A Handbook of Use Cases},
  author={Liu, Peng and Liu, Tao and Luo, Nanqing and Shang, Zitong and Wang, Haizhou and Wang, Zhilong and Zhang, Lan and Zou, Qingtian},
  year={2022},
  url = {https://www.amazon.com/gp/product/B09T3123RB/},
  note = {Kindle edition},
  publisher={Amazon}
}

Abstract

Deep learning and reinforcement learning have been increasingly applied in solving cybersecurity challenges. However, the existing survey papers have limited usefulness for engineers, security analysts, and students taking an “AI for Cybersecurity” course. Therefore, we provide them with a handbook of use cases (e.g., using AI to conduct reverse engineering tasks, using AI to detect malware). In this book, we advocate “applying DL in a systematic way”, observe that “ML pipeline standardization” is a good thing in the cybersecurity industry, and believe that the industry could be benefited a lot from ML pipeline standardization when applying DL and RL to solve various cybersecurity challenges. Engineers, security analysts, and students can use this handbook to get a hands-on introduction to how to apply DL and RL to solve a particular cybersecurity problem. Using the code snippets and dataset links provided in the handbook, the readers can achieve “learning by doing” at the use case level.

Table of Contents

Errata

If you find an error, please report it using Github Issues. We appreciate any issues you raise now and we will keep an updated pdf version here.

Download

PDF of manuscript is posted by Penn State Cybersecurity Lab. Users could download a copy (Download) for personal use, educational purpose and etc.

Code and Data

All of the code related to the Book is stored in AIforCybersecurity.