Cyber defense mechanisms: security, privacy, and challenges
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2021
|
Ausgabe: | First edition |
Schriftenreihe: | Artificial Intelligence (AI): Elementary to advanced practices
|
Schlagworte: | |
Online-Zugang: | TUM01 |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource Illustrationen, Diagramme |
ISBN: | 9781000171983 9780367816438 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047441775 | ||
003 | DE-604 | ||
005 | 20230818 | ||
007 | cr|uuu---uuuuu | ||
008 | 210827s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781000171983 |9 978-1-00-017198-3 | ||
020 | |a 9780367816438 |9 978-0-367-81643-8 | ||
035 | |a (ZDB-30-PQE)EBC6266687 | ||
035 | |a (ZDB-30-PAD)EBC6266687 | ||
035 | |a (ZDB-89-EBL)EBL6266687 | ||
035 | |a (OCoLC)1203540544 | ||
035 | |a (DE-599)BVBBV047441775 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
082 | 0 | |a 5.8 | |
084 | |a DAT 461 |2 stub | ||
245 | 1 | 0 | |a Cyber defense mechanisms |b security, privacy, and challenges |c edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong |
250 | |a First edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2021 | |
264 | 4 | |c ©2021 | |
300 | |a 1 Online-Ressource |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artificial Intelligence (AI): Elementary to advanced practices | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps -- 1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats -- 1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation -- 2.3 Single-Access Optical Network Ring Architecture | |
505 | 8 | |a 2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer -- 3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack -- 4.4.3 Power Consumption Attack -- 4.4.4 Location Privacy -- 4.5 Performance Evaluation -- 4.5.1 Countermeasures in CR-WSN -- 4.6 Conclusion and Future Work -- References -- Chapter 5 Security Issues in IoT Networks -- 5.1 Introduction -- 5.2 Challenges for IoT Network -- 5.2.1 The Most Important Challenges in IoT Network -- 5.2.1.1 Schema Processing -- 5.2.1.2 Speed -- 5.2.1.3 The Value -- 5.2.1.4 The Security -- 5.3 Elements for the Internet of Things (IoT) -- 5.4 Cases and Scenarios for IoT Network -- 5.4.1 Clustering -- 5.4.2 Tracking -- 5.4.3 Tactical Networks and High Dynamic Network -- 5.5 The Vision of Internet of Things (IoT) -- 5.6 Software-Defined IoT -- 5.7 IoT Architecture -- 5.8 Algorithm for Internet of Things (IoT) | |
505 | 8 | |a 5.9 Business Context of the IoT -- 5.10 IoT Device Information Collection Process -- 5.11 Introduction to IoT Security -- 5.12 D evelopment of IoT Security Mechanisms -- 5.13 Security Attacks in IoT -- 5.14 IoT Security Challenges -- 5.14.1 IoT Security Risks and Challenges -- 5.14.2 IoT Security Requirements -- 5.15 Conclusion -- References -- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario -- 6.1 IoT Ecosystem History -- 6.2 IoT Ecosystem -- 6.2.1 Building an IoT Ecosystem -- 6.3 Challenges in Building an Ecosystem -- 6.4 IoT Ecosystem Implications -- 6.5 IoT Security Implications -- 6.6 Current IoT Security Scenario and Trends -- 6.6.1 Why These Are Not Enough -- 6.6.2 The Ideal Security System -- 6.7 A Solution-Blockchain Technology -- 6.7.1 Implementing Blockchain in an IoT Ecosystem -- 6.8 Conclusion -- References -- Chapter 7 Design Principles and Privacy in Cloud Computing -- 7.1 Introduction -- 7.1.1 Evolution of Cloud Computing -- 7.1.2 Applications of Cloud Computing in Various Domains -- 7.1.3 Generalized Architecture for Cloud Computing -- 7.1.4 Design Principles in Cloud Computing -- 7.1.5 Privacy Issues in Cloud Computing -- 7.1.6 Chapter Outline -- 7.2 Security Requirements and Attacks in Cloud Computing -- 7.2.1 Threat Model -- 7.2.2 Security Requirements in Cloud Computing -- 7.2.3 Security Attacks in Cloud Computing -- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing -- 7.3.1 Key Management -- 7.3.2 User Authentication/Device Authentication -- 7.3.3 Access Control/User Access Control -- 7.3.4 Intrusion Detection -- 7.3.5 Privacy Preservation -- 7.4 Challenges and Future Research Directions -- 7.4.1 Design of Lightweight Security Protocols -- 7.4.2 Securing Data Mining Methods -- 7.4.3 Granular Auditing -- 7.4.4 Blockchain-Based Decentralized Mechanisms -- 7.5 Conclusion | |
505 | 8 | |a Bibliography -- Chapter 8 Big Data Analysis on Smart Tools and Techniques -- 8.1 Introduction -- 8.2 Big Data Challenges -- 8.3 Big Data Analysis Techniques and Tools -- 8.3.1 Data Mining -- 8.3.2 Web Mining -- 8.3.3 Visualization Methods -- 8.3.4 Machine Learning -- 8.3.5 Multilayer Perceptron (MLP) -- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) -- 8.3.7 Support Vector Machine (SVM) -- 8.3.8 Optimization Methods -- 8.3.9 Stochastic Optimization -- 8.3.10 Deterministic Optimization -- 8.4 Related Work -- 8.5 Discussion and Conclusion -- 8.5.1 Discussion -- 8.5.2 Conclusion -- References -- Chapter 9 Lightweight Security Protocols for Blockchain Technology -- 9.1 Introduction -- 9.2 Blockchain Technology Design Space -- 9.3 Consensus -- 9.3.1 Distinct Features of Blockchain Distributed Architecture -- 9.4 Practical Applications of Blockchain -- 9.5 Advantages and Disadvantages of Blockchain -- 9.5.1 Advantages -- 9.5.2 Disadvantages -- 9.6 Limitations and Drawbacks of Blockchain -- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology -- 9.7.1 Comparison of Security and Functionality Features -- 9.7.2 Comparison of Communication Costs -- 9.7.3 Comparison of Computation Costs -- 9.8 Deployment and Implementation of Testbeds for Blockchain -- 9.9 Conclusion -- Acknowledgments -- Bibliography -- Chapter 10 Privacy and Challenges to Data-Intensive Techniques -- 10.1 Introduction -- 10.2 Advantages of Cybersecurity -- 10.3 Approach and Workflow -- 10.3.1 Common Steps in Cybersecurity -- 10.3.2 Set Up Your Risk Management Regime -- 10.4 Cybersecurity Principles and Goals -- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution -- 10.5.1 Confidentiality -- 10.5.1.1 Tools for Confidentiality -- 10.5.2 Integrity -- 10.5.2.1 Tools for Integrity -- 10.5.3 Availability -- 10.5.3.1 Tools of Availability | |
505 | 8 | |a 10.5.4 Challenges of Cybersecurity -- 10.5.5 Data Security Consideration -- 10.6 Privacy Preservation -- 10.6.1 Privacy in Cybersecurity -- 10.6.2 Data-Intensive Technology -- 10.7 Challenges in Data-Intensive Techniques -- 10.8 Cybersecurity to Data-Intensive Techniques -- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques -- 10.9 Conclusion -- References -- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine -- 11.1 Introduction -- 11.2 Related Works -- 11.3 Nomenclature -- 11.4 Formulation of Mathematical Model and Assumptions -- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) -- 1 11.6 Basic Reproduction Number and Equilibrium -- 11.7 Existence and Stability Analysis -- 11.8 Conclusion -- References -- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method -- 12.1 Introduction -- 12.2 Purpose and Goal of the Research -- 12.3 Relationship between the AI/Human Players and the System -- 12.4 Game-Related Information -- 12.4.1 Game Rules -- 12.4.2 Character Information -- 12.5 Approach -- 12.5.1 Rule-Based Method Structure -- 12.5.2 Rule Analysis of the Fighting Game Player -- 12.5.3 Methodology -- 12.6 Experiment -- 12.6.1 Environment and Settings -- 12.6.2 Results and Discussions -- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player -- 12.7 C onclusion -- References -- Chapter 13 Web-Based Smart Agriculture System -- 13.1 Introduction -- 13.2 Major Factors of Smart Agriculture -- 13.2.1 Increase in Agriculture Productivity -- 13.2.2 Minimizing Agriculture Greenhouse Gases -- 13.3 Ancient Farming Technology and Machinery -- 13.3.1 Old Techniques -- 13.3.2 Old Machinery -- 13.4 Drawbacks of Old Techniques -- 13.5 Tools Used For Smart Agriculture | |
505 | 8 | |a 13.5.1 GPS Locator | |
650 | 4 | |a Computer security | |
700 | 1 | |a Kumar, Gautam |4 edt | |
700 | 1 | |a Saini, Dinesh Kumar |4 edt | |
700 | 1 | |a Cuong, Nguyen Ha Huy |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |a Kumar, Gautam |t Cyber Defense Mechanisms |d Milton : Taylor & Francis Group,c2020 |n Druck-Ausgabe, Hardcover |z 978-0-367-40883-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-367-54096-8 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032843927 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6266687 |l TUM01 |p ZDB-30-PQE |q TUM_PDA_PQE_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182734666465281 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Kumar, Gautam Saini, Dinesh Kumar Cuong, Nguyen Ha Huy |
author2_role | edt edt edt |
author2_variant | g k gk d k s dk dks n h h c nhh nhhc |
author_facet | Kumar, Gautam Saini, Dinesh Kumar Cuong, Nguyen Ha Huy |
building | Verbundindex |
bvnumber | BV047441775 |
classification_tum | DAT 461 |
collection | ZDB-30-PQE |
contents | Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps -- 1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats -- 1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation -- 2.3 Single-Access Optical Network Ring Architecture 2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer -- 3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack -- 4.4.3 Power Consumption Attack -- 4.4.4 Location Privacy -- 4.5 Performance Evaluation -- 4.5.1 Countermeasures in CR-WSN -- 4.6 Conclusion and Future Work -- References -- Chapter 5 Security Issues in IoT Networks -- 5.1 Introduction -- 5.2 Challenges for IoT Network -- 5.2.1 The Most Important Challenges in IoT Network -- 5.2.1.1 Schema Processing -- 5.2.1.2 Speed -- 5.2.1.3 The Value -- 5.2.1.4 The Security -- 5.3 Elements for the Internet of Things (IoT) -- 5.4 Cases and Scenarios for IoT Network -- 5.4.1 Clustering -- 5.4.2 Tracking -- 5.4.3 Tactical Networks and High Dynamic Network -- 5.5 The Vision of Internet of Things (IoT) -- 5.6 Software-Defined IoT -- 5.7 IoT Architecture -- 5.8 Algorithm for Internet of Things (IoT) 5.9 Business Context of the IoT -- 5.10 IoT Device Information Collection Process -- 5.11 Introduction to IoT Security -- 5.12 D evelopment of IoT Security Mechanisms -- 5.13 Security Attacks in IoT -- 5.14 IoT Security Challenges -- 5.14.1 IoT Security Risks and Challenges -- 5.14.2 IoT Security Requirements -- 5.15 Conclusion -- References -- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario -- 6.1 IoT Ecosystem History -- 6.2 IoT Ecosystem -- 6.2.1 Building an IoT Ecosystem -- 6.3 Challenges in Building an Ecosystem -- 6.4 IoT Ecosystem Implications -- 6.5 IoT Security Implications -- 6.6 Current IoT Security Scenario and Trends -- 6.6.1 Why These Are Not Enough -- 6.6.2 The Ideal Security System -- 6.7 A Solution-Blockchain Technology -- 6.7.1 Implementing Blockchain in an IoT Ecosystem -- 6.8 Conclusion -- References -- Chapter 7 Design Principles and Privacy in Cloud Computing -- 7.1 Introduction -- 7.1.1 Evolution of Cloud Computing -- 7.1.2 Applications of Cloud Computing in Various Domains -- 7.1.3 Generalized Architecture for Cloud Computing -- 7.1.4 Design Principles in Cloud Computing -- 7.1.5 Privacy Issues in Cloud Computing -- 7.1.6 Chapter Outline -- 7.2 Security Requirements and Attacks in Cloud Computing -- 7.2.1 Threat Model -- 7.2.2 Security Requirements in Cloud Computing -- 7.2.3 Security Attacks in Cloud Computing -- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing -- 7.3.1 Key Management -- 7.3.2 User Authentication/Device Authentication -- 7.3.3 Access Control/User Access Control -- 7.3.4 Intrusion Detection -- 7.3.5 Privacy Preservation -- 7.4 Challenges and Future Research Directions -- 7.4.1 Design of Lightweight Security Protocols -- 7.4.2 Securing Data Mining Methods -- 7.4.3 Granular Auditing -- 7.4.4 Blockchain-Based Decentralized Mechanisms -- 7.5 Conclusion Bibliography -- Chapter 8 Big Data Analysis on Smart Tools and Techniques -- 8.1 Introduction -- 8.2 Big Data Challenges -- 8.3 Big Data Analysis Techniques and Tools -- 8.3.1 Data Mining -- 8.3.2 Web Mining -- 8.3.3 Visualization Methods -- 8.3.4 Machine Learning -- 8.3.5 Multilayer Perceptron (MLP) -- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) -- 8.3.7 Support Vector Machine (SVM) -- 8.3.8 Optimization Methods -- 8.3.9 Stochastic Optimization -- 8.3.10 Deterministic Optimization -- 8.4 Related Work -- 8.5 Discussion and Conclusion -- 8.5.1 Discussion -- 8.5.2 Conclusion -- References -- Chapter 9 Lightweight Security Protocols for Blockchain Technology -- 9.1 Introduction -- 9.2 Blockchain Technology Design Space -- 9.3 Consensus -- 9.3.1 Distinct Features of Blockchain Distributed Architecture -- 9.4 Practical Applications of Blockchain -- 9.5 Advantages and Disadvantages of Blockchain -- 9.5.1 Advantages -- 9.5.2 Disadvantages -- 9.6 Limitations and Drawbacks of Blockchain -- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology -- 9.7.1 Comparison of Security and Functionality Features -- 9.7.2 Comparison of Communication Costs -- 9.7.3 Comparison of Computation Costs -- 9.8 Deployment and Implementation of Testbeds for Blockchain -- 9.9 Conclusion -- Acknowledgments -- Bibliography -- Chapter 10 Privacy and Challenges to Data-Intensive Techniques -- 10.1 Introduction -- 10.2 Advantages of Cybersecurity -- 10.3 Approach and Workflow -- 10.3.1 Common Steps in Cybersecurity -- 10.3.2 Set Up Your Risk Management Regime -- 10.4 Cybersecurity Principles and Goals -- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution -- 10.5.1 Confidentiality -- 10.5.1.1 Tools for Confidentiality -- 10.5.2 Integrity -- 10.5.2.1 Tools for Integrity -- 10.5.3 Availability -- 10.5.3.1 Tools of Availability 10.5.4 Challenges of Cybersecurity -- 10.5.5 Data Security Consideration -- 10.6 Privacy Preservation -- 10.6.1 Privacy in Cybersecurity -- 10.6.2 Data-Intensive Technology -- 10.7 Challenges in Data-Intensive Techniques -- 10.8 Cybersecurity to Data-Intensive Techniques -- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques -- 10.9 Conclusion -- References -- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine -- 11.1 Introduction -- 11.2 Related Works -- 11.3 Nomenclature -- 11.4 Formulation of Mathematical Model and Assumptions -- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) -- 1 11.6 Basic Reproduction Number and Equilibrium -- 11.7 Existence and Stability Analysis -- 11.8 Conclusion -- References -- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method -- 12.1 Introduction -- 12.2 Purpose and Goal of the Research -- 12.3 Relationship between the AI/Human Players and the System -- 12.4 Game-Related Information -- 12.4.1 Game Rules -- 12.4.2 Character Information -- 12.5 Approach -- 12.5.1 Rule-Based Method Structure -- 12.5.2 Rule Analysis of the Fighting Game Player -- 12.5.3 Methodology -- 12.6 Experiment -- 12.6.1 Environment and Settings -- 12.6.2 Results and Discussions -- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player -- 12.7 C onclusion -- References -- Chapter 13 Web-Based Smart Agriculture System -- 13.1 Introduction -- 13.2 Major Factors of Smart Agriculture -- 13.2.1 Increase in Agriculture Productivity -- 13.2.2 Minimizing Agriculture Greenhouse Gases -- 13.3 Ancient Farming Technology and Machinery -- 13.3.1 Old Techniques -- 13.3.2 Old Machinery -- 13.4 Drawbacks of Old Techniques -- 13.5 Tools Used For Smart Agriculture 13.5.1 GPS Locator |
ctrlnum | (ZDB-30-PQE)EBC6266687 (ZDB-30-PAD)EBC6266687 (ZDB-89-EBL)EBL6266687 (OCoLC)1203540544 (DE-599)BVBBV047441775 |
dewey-full | 5.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 5.8 |
dewey-search | 5.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11248nmm a2200529zc 4500</leader><controlfield tag="001">BV047441775</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230818 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210827s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000171983</subfield><subfield code="9">978-1-00-017198-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367816438</subfield><subfield code="9">978-0-367-81643-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6266687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6266687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6266687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1203540544</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047441775</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">5.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber defense mechanisms</subfield><subfield code="b">security, privacy, and challenges</subfield><subfield code="c">edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artificial Intelligence (AI): Elementary to advanced practices</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps -- 1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats -- 1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation -- 2.3 Single-Access Optical Network Ring Architecture</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer -- 3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack -- 4.4.3 Power Consumption Attack -- 4.4.4 Location Privacy -- 4.5 Performance Evaluation -- 4.5.1 Countermeasures in CR-WSN -- 4.6 Conclusion and Future Work -- References -- Chapter 5 Security Issues in IoT Networks -- 5.1 Introduction -- 5.2 Challenges for IoT Network -- 5.2.1 The Most Important Challenges in IoT Network -- 5.2.1.1 Schema Processing -- 5.2.1.2 Speed -- 5.2.1.3 The Value -- 5.2.1.4 The Security -- 5.3 Elements for the Internet of Things (IoT) -- 5.4 Cases and Scenarios for IoT Network -- 5.4.1 Clustering -- 5.4.2 Tracking -- 5.4.3 Tactical Networks and High Dynamic Network -- 5.5 The Vision of Internet of Things (IoT) -- 5.6 Software-Defined IoT -- 5.7 IoT Architecture -- 5.8 Algorithm for Internet of Things (IoT)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.9 Business Context of the IoT -- 5.10 IoT Device Information Collection Process -- 5.11 Introduction to IoT Security -- 5.12 D evelopment of IoT Security Mechanisms -- 5.13 Security Attacks in IoT -- 5.14 IoT Security Challenges -- 5.14.1 IoT Security Risks and Challenges -- 5.14.2 IoT Security Requirements -- 5.15 Conclusion -- References -- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario -- 6.1 IoT Ecosystem History -- 6.2 IoT Ecosystem -- 6.2.1 Building an IoT Ecosystem -- 6.3 Challenges in Building an Ecosystem -- 6.4 IoT Ecosystem Implications -- 6.5 IoT Security Implications -- 6.6 Current IoT Security Scenario and Trends -- 6.6.1 Why These Are Not Enough -- 6.6.2 The Ideal Security System -- 6.7 A Solution-Blockchain Technology -- 6.7.1 Implementing Blockchain in an IoT Ecosystem -- 6.8 Conclusion -- References -- Chapter 7 Design Principles and Privacy in Cloud Computing -- 7.1 Introduction -- 7.1.1 Evolution of Cloud Computing -- 7.1.2 Applications of Cloud Computing in Various Domains -- 7.1.3 Generalized Architecture for Cloud Computing -- 7.1.4 Design Principles in Cloud Computing -- 7.1.5 Privacy Issues in Cloud Computing -- 7.1.6 Chapter Outline -- 7.2 Security Requirements and Attacks in Cloud Computing -- 7.2.1 Threat Model -- 7.2.2 Security Requirements in Cloud Computing -- 7.2.3 Security Attacks in Cloud Computing -- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing -- 7.3.1 Key Management -- 7.3.2 User Authentication/Device Authentication -- 7.3.3 Access Control/User Access Control -- 7.3.4 Intrusion Detection -- 7.3.5 Privacy Preservation -- 7.4 Challenges and Future Research Directions -- 7.4.1 Design of Lightweight Security Protocols -- 7.4.2 Securing Data Mining Methods -- 7.4.3 Granular Auditing -- 7.4.4 Blockchain-Based Decentralized Mechanisms -- 7.5 Conclusion</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Bibliography -- Chapter 8 Big Data Analysis on Smart Tools and Techniques -- 8.1 Introduction -- 8.2 Big Data Challenges -- 8.3 Big Data Analysis Techniques and Tools -- 8.3.1 Data Mining -- 8.3.2 Web Mining -- 8.3.3 Visualization Methods -- 8.3.4 Machine Learning -- 8.3.5 Multilayer Perceptron (MLP) -- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) -- 8.3.7 Support Vector Machine (SVM) -- 8.3.8 Optimization Methods -- 8.3.9 Stochastic Optimization -- 8.3.10 Deterministic Optimization -- 8.4 Related Work -- 8.5 Discussion and Conclusion -- 8.5.1 Discussion -- 8.5.2 Conclusion -- References -- Chapter 9 Lightweight Security Protocols for Blockchain Technology -- 9.1 Introduction -- 9.2 Blockchain Technology Design Space -- 9.3 Consensus -- 9.3.1 Distinct Features of Blockchain Distributed Architecture -- 9.4 Practical Applications of Blockchain -- 9.5 Advantages and Disadvantages of Blockchain -- 9.5.1 Advantages -- 9.5.2 Disadvantages -- 9.6 Limitations and Drawbacks of Blockchain -- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology -- 9.7.1 Comparison of Security and Functionality Features -- 9.7.2 Comparison of Communication Costs -- 9.7.3 Comparison of Computation Costs -- 9.8 Deployment and Implementation of Testbeds for Blockchain -- 9.9 Conclusion -- Acknowledgments -- Bibliography -- Chapter 10 Privacy and Challenges to Data-Intensive Techniques -- 10.1 Introduction -- 10.2 Advantages of Cybersecurity -- 10.3 Approach and Workflow -- 10.3.1 Common Steps in Cybersecurity -- 10.3.2 Set Up Your Risk Management Regime -- 10.4 Cybersecurity Principles and Goals -- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution -- 10.5.1 Confidentiality -- 10.5.1.1 Tools for Confidentiality -- 10.5.2 Integrity -- 10.5.2.1 Tools for Integrity -- 10.5.3 Availability -- 10.5.3.1 Tools of Availability</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">10.5.4 Challenges of Cybersecurity -- 10.5.5 Data Security Consideration -- 10.6 Privacy Preservation -- 10.6.1 Privacy in Cybersecurity -- 10.6.2 Data-Intensive Technology -- 10.7 Challenges in Data-Intensive Techniques -- 10.8 Cybersecurity to Data-Intensive Techniques -- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques -- 10.9 Conclusion -- References -- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine -- 11.1 Introduction -- 11.2 Related Works -- 11.3 Nomenclature -- 11.4 Formulation of Mathematical Model and Assumptions -- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) -- 1 11.6 Basic Reproduction Number and Equilibrium -- 11.7 Existence and Stability Analysis -- 11.8 Conclusion -- References -- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method -- 12.1 Introduction -- 12.2 Purpose and Goal of the Research -- 12.3 Relationship between the AI/Human Players and the System -- 12.4 Game-Related Information -- 12.4.1 Game Rules -- 12.4.2 Character Information -- 12.5 Approach -- 12.5.1 Rule-Based Method Structure -- 12.5.2 Rule Analysis of the Fighting Game Player -- 12.5.3 Methodology -- 12.6 Experiment -- 12.6.1 Environment and Settings -- 12.6.2 Results and Discussions -- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player -- 12.7 C onclusion -- References -- Chapter 13 Web-Based Smart Agriculture System -- 13.1 Introduction -- 13.2 Major Factors of Smart Agriculture -- 13.2.1 Increase in Agriculture Productivity -- 13.2.2 Minimizing Agriculture Greenhouse Gases -- 13.3 Ancient Farming Technology and Machinery -- 13.3.1 Old Techniques -- 13.3.2 Old Machinery -- 13.4 Drawbacks of Old Techniques -- 13.5 Tools Used For Smart Agriculture</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">13.5.1 GPS Locator</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Gautam</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saini, Dinesh Kumar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cuong, Nguyen Ha Huy</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="a">Kumar, Gautam</subfield><subfield code="t">Cyber Defense Mechanisms</subfield><subfield code="d">Milton : Taylor & Francis Group,c2020</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-367-40883-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-367-54096-8</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032843927</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6266687</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_PDA_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047441775 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:01:23Z |
indexdate | 2024-07-10T09:12:15Z |
institution | BVB |
isbn | 9781000171983 9780367816438 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032843927 |
oclc_num | 1203540544 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource Illustrationen, Diagramme |
psigel | ZDB-30-PQE ZDB-30-PQE TUM_PDA_PQE_Kauf |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | CRC Press |
record_format | marc |
series2 | Artificial Intelligence (AI): Elementary to advanced practices |
spelling | Cyber defense mechanisms security, privacy, and challenges edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong First edition Boca Raton ; London ; New York CRC Press 2021 ©2021 1 Online-Ressource Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Artificial Intelligence (AI): Elementary to advanced practices Description based on publisher supplied metadata and other sources Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps -- 1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats -- 1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation -- 2.3 Single-Access Optical Network Ring Architecture 2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer -- 3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack -- 4.4.3 Power Consumption Attack -- 4.4.4 Location Privacy -- 4.5 Performance Evaluation -- 4.5.1 Countermeasures in CR-WSN -- 4.6 Conclusion and Future Work -- References -- Chapter 5 Security Issues in IoT Networks -- 5.1 Introduction -- 5.2 Challenges for IoT Network -- 5.2.1 The Most Important Challenges in IoT Network -- 5.2.1.1 Schema Processing -- 5.2.1.2 Speed -- 5.2.1.3 The Value -- 5.2.1.4 The Security -- 5.3 Elements for the Internet of Things (IoT) -- 5.4 Cases and Scenarios for IoT Network -- 5.4.1 Clustering -- 5.4.2 Tracking -- 5.4.3 Tactical Networks and High Dynamic Network -- 5.5 The Vision of Internet of Things (IoT) -- 5.6 Software-Defined IoT -- 5.7 IoT Architecture -- 5.8 Algorithm for Internet of Things (IoT) 5.9 Business Context of the IoT -- 5.10 IoT Device Information Collection Process -- 5.11 Introduction to IoT Security -- 5.12 D evelopment of IoT Security Mechanisms -- 5.13 Security Attacks in IoT -- 5.14 IoT Security Challenges -- 5.14.1 IoT Security Risks and Challenges -- 5.14.2 IoT Security Requirements -- 5.15 Conclusion -- References -- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario -- 6.1 IoT Ecosystem History -- 6.2 IoT Ecosystem -- 6.2.1 Building an IoT Ecosystem -- 6.3 Challenges in Building an Ecosystem -- 6.4 IoT Ecosystem Implications -- 6.5 IoT Security Implications -- 6.6 Current IoT Security Scenario and Trends -- 6.6.1 Why These Are Not Enough -- 6.6.2 The Ideal Security System -- 6.7 A Solution-Blockchain Technology -- 6.7.1 Implementing Blockchain in an IoT Ecosystem -- 6.8 Conclusion -- References -- Chapter 7 Design Principles and Privacy in Cloud Computing -- 7.1 Introduction -- 7.1.1 Evolution of Cloud Computing -- 7.1.2 Applications of Cloud Computing in Various Domains -- 7.1.3 Generalized Architecture for Cloud Computing -- 7.1.4 Design Principles in Cloud Computing -- 7.1.5 Privacy Issues in Cloud Computing -- 7.1.6 Chapter Outline -- 7.2 Security Requirements and Attacks in Cloud Computing -- 7.2.1 Threat Model -- 7.2.2 Security Requirements in Cloud Computing -- 7.2.3 Security Attacks in Cloud Computing -- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing -- 7.3.1 Key Management -- 7.3.2 User Authentication/Device Authentication -- 7.3.3 Access Control/User Access Control -- 7.3.4 Intrusion Detection -- 7.3.5 Privacy Preservation -- 7.4 Challenges and Future Research Directions -- 7.4.1 Design of Lightweight Security Protocols -- 7.4.2 Securing Data Mining Methods -- 7.4.3 Granular Auditing -- 7.4.4 Blockchain-Based Decentralized Mechanisms -- 7.5 Conclusion Bibliography -- Chapter 8 Big Data Analysis on Smart Tools and Techniques -- 8.1 Introduction -- 8.2 Big Data Challenges -- 8.3 Big Data Analysis Techniques and Tools -- 8.3.1 Data Mining -- 8.3.2 Web Mining -- 8.3.3 Visualization Methods -- 8.3.4 Machine Learning -- 8.3.5 Multilayer Perceptron (MLP) -- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) -- 8.3.7 Support Vector Machine (SVM) -- 8.3.8 Optimization Methods -- 8.3.9 Stochastic Optimization -- 8.3.10 Deterministic Optimization -- 8.4 Related Work -- 8.5 Discussion and Conclusion -- 8.5.1 Discussion -- 8.5.2 Conclusion -- References -- Chapter 9 Lightweight Security Protocols for Blockchain Technology -- 9.1 Introduction -- 9.2 Blockchain Technology Design Space -- 9.3 Consensus -- 9.3.1 Distinct Features of Blockchain Distributed Architecture -- 9.4 Practical Applications of Blockchain -- 9.5 Advantages and Disadvantages of Blockchain -- 9.5.1 Advantages -- 9.5.2 Disadvantages -- 9.6 Limitations and Drawbacks of Blockchain -- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology -- 9.7.1 Comparison of Security and Functionality Features -- 9.7.2 Comparison of Communication Costs -- 9.7.3 Comparison of Computation Costs -- 9.8 Deployment and Implementation of Testbeds for Blockchain -- 9.9 Conclusion -- Acknowledgments -- Bibliography -- Chapter 10 Privacy and Challenges to Data-Intensive Techniques -- 10.1 Introduction -- 10.2 Advantages of Cybersecurity -- 10.3 Approach and Workflow -- 10.3.1 Common Steps in Cybersecurity -- 10.3.2 Set Up Your Risk Management Regime -- 10.4 Cybersecurity Principles and Goals -- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution -- 10.5.1 Confidentiality -- 10.5.1.1 Tools for Confidentiality -- 10.5.2 Integrity -- 10.5.2.1 Tools for Integrity -- 10.5.3 Availability -- 10.5.3.1 Tools of Availability 10.5.4 Challenges of Cybersecurity -- 10.5.5 Data Security Consideration -- 10.6 Privacy Preservation -- 10.6.1 Privacy in Cybersecurity -- 10.6.2 Data-Intensive Technology -- 10.7 Challenges in Data-Intensive Techniques -- 10.8 Cybersecurity to Data-Intensive Techniques -- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques -- 10.9 Conclusion -- References -- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine -- 11.1 Introduction -- 11.2 Related Works -- 11.3 Nomenclature -- 11.4 Formulation of Mathematical Model and Assumptions -- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) -- 1 11.6 Basic Reproduction Number and Equilibrium -- 11.7 Existence and Stability Analysis -- 11.8 Conclusion -- References -- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method -- 12.1 Introduction -- 12.2 Purpose and Goal of the Research -- 12.3 Relationship between the AI/Human Players and the System -- 12.4 Game-Related Information -- 12.4.1 Game Rules -- 12.4.2 Character Information -- 12.5 Approach -- 12.5.1 Rule-Based Method Structure -- 12.5.2 Rule Analysis of the Fighting Game Player -- 12.5.3 Methodology -- 12.6 Experiment -- 12.6.1 Environment and Settings -- 12.6.2 Results and Discussions -- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player -- 12.7 C onclusion -- References -- Chapter 13 Web-Based Smart Agriculture System -- 13.1 Introduction -- 13.2 Major Factors of Smart Agriculture -- 13.2.1 Increase in Agriculture Productivity -- 13.2.2 Minimizing Agriculture Greenhouse Gases -- 13.3 Ancient Farming Technology and Machinery -- 13.3.1 Old Techniques -- 13.3.2 Old Machinery -- 13.4 Drawbacks of Old Techniques -- 13.5 Tools Used For Smart Agriculture 13.5.1 GPS Locator Computer security Kumar, Gautam edt Saini, Dinesh Kumar edt Cuong, Nguyen Ha Huy edt Erscheint auch als Kumar, Gautam Cyber Defense Mechanisms Milton : Taylor & Francis Group,c2020 Druck-Ausgabe, Hardcover 978-0-367-40883-1 Erscheint auch als Druck-Ausgabe, Paperback 978-0-367-54096-8 |
spellingShingle | Cyber defense mechanisms security, privacy, and challenges Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps -- 1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats -- 1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation -- 2.3 Single-Access Optical Network Ring Architecture 2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer -- 3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack -- 4.4.3 Power Consumption Attack -- 4.4.4 Location Privacy -- 4.5 Performance Evaluation -- 4.5.1 Countermeasures in CR-WSN -- 4.6 Conclusion and Future Work -- References -- Chapter 5 Security Issues in IoT Networks -- 5.1 Introduction -- 5.2 Challenges for IoT Network -- 5.2.1 The Most Important Challenges in IoT Network -- 5.2.1.1 Schema Processing -- 5.2.1.2 Speed -- 5.2.1.3 The Value -- 5.2.1.4 The Security -- 5.3 Elements for the Internet of Things (IoT) -- 5.4 Cases and Scenarios for IoT Network -- 5.4.1 Clustering -- 5.4.2 Tracking -- 5.4.3 Tactical Networks and High Dynamic Network -- 5.5 The Vision of Internet of Things (IoT) -- 5.6 Software-Defined IoT -- 5.7 IoT Architecture -- 5.8 Algorithm for Internet of Things (IoT) 5.9 Business Context of the IoT -- 5.10 IoT Device Information Collection Process -- 5.11 Introduction to IoT Security -- 5.12 D evelopment of IoT Security Mechanisms -- 5.13 Security Attacks in IoT -- 5.14 IoT Security Challenges -- 5.14.1 IoT Security Risks and Challenges -- 5.14.2 IoT Security Requirements -- 5.15 Conclusion -- References -- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario -- 6.1 IoT Ecosystem History -- 6.2 IoT Ecosystem -- 6.2.1 Building an IoT Ecosystem -- 6.3 Challenges in Building an Ecosystem -- 6.4 IoT Ecosystem Implications -- 6.5 IoT Security Implications -- 6.6 Current IoT Security Scenario and Trends -- 6.6.1 Why These Are Not Enough -- 6.6.2 The Ideal Security System -- 6.7 A Solution-Blockchain Technology -- 6.7.1 Implementing Blockchain in an IoT Ecosystem -- 6.8 Conclusion -- References -- Chapter 7 Design Principles and Privacy in Cloud Computing -- 7.1 Introduction -- 7.1.1 Evolution of Cloud Computing -- 7.1.2 Applications of Cloud Computing in Various Domains -- 7.1.3 Generalized Architecture for Cloud Computing -- 7.1.4 Design Principles in Cloud Computing -- 7.1.5 Privacy Issues in Cloud Computing -- 7.1.6 Chapter Outline -- 7.2 Security Requirements and Attacks in Cloud Computing -- 7.2.1 Threat Model -- 7.2.2 Security Requirements in Cloud Computing -- 7.2.3 Security Attacks in Cloud Computing -- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing -- 7.3.1 Key Management -- 7.3.2 User Authentication/Device Authentication -- 7.3.3 Access Control/User Access Control -- 7.3.4 Intrusion Detection -- 7.3.5 Privacy Preservation -- 7.4 Challenges and Future Research Directions -- 7.4.1 Design of Lightweight Security Protocols -- 7.4.2 Securing Data Mining Methods -- 7.4.3 Granular Auditing -- 7.4.4 Blockchain-Based Decentralized Mechanisms -- 7.5 Conclusion Bibliography -- Chapter 8 Big Data Analysis on Smart Tools and Techniques -- 8.1 Introduction -- 8.2 Big Data Challenges -- 8.3 Big Data Analysis Techniques and Tools -- 8.3.1 Data Mining -- 8.3.2 Web Mining -- 8.3.3 Visualization Methods -- 8.3.4 Machine Learning -- 8.3.5 Multilayer Perceptron (MLP) -- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) -- 8.3.7 Support Vector Machine (SVM) -- 8.3.8 Optimization Methods -- 8.3.9 Stochastic Optimization -- 8.3.10 Deterministic Optimization -- 8.4 Related Work -- 8.5 Discussion and Conclusion -- 8.5.1 Discussion -- 8.5.2 Conclusion -- References -- Chapter 9 Lightweight Security Protocols for Blockchain Technology -- 9.1 Introduction -- 9.2 Blockchain Technology Design Space -- 9.3 Consensus -- 9.3.1 Distinct Features of Blockchain Distributed Architecture -- 9.4 Practical Applications of Blockchain -- 9.5 Advantages and Disadvantages of Blockchain -- 9.5.1 Advantages -- 9.5.2 Disadvantages -- 9.6 Limitations and Drawbacks of Blockchain -- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology -- 9.7.1 Comparison of Security and Functionality Features -- 9.7.2 Comparison of Communication Costs -- 9.7.3 Comparison of Computation Costs -- 9.8 Deployment and Implementation of Testbeds for Blockchain -- 9.9 Conclusion -- Acknowledgments -- Bibliography -- Chapter 10 Privacy and Challenges to Data-Intensive Techniques -- 10.1 Introduction -- 10.2 Advantages of Cybersecurity -- 10.3 Approach and Workflow -- 10.3.1 Common Steps in Cybersecurity -- 10.3.2 Set Up Your Risk Management Regime -- 10.4 Cybersecurity Principles and Goals -- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution -- 10.5.1 Confidentiality -- 10.5.1.1 Tools for Confidentiality -- 10.5.2 Integrity -- 10.5.2.1 Tools for Integrity -- 10.5.3 Availability -- 10.5.3.1 Tools of Availability 10.5.4 Challenges of Cybersecurity -- 10.5.5 Data Security Consideration -- 10.6 Privacy Preservation -- 10.6.1 Privacy in Cybersecurity -- 10.6.2 Data-Intensive Technology -- 10.7 Challenges in Data-Intensive Techniques -- 10.8 Cybersecurity to Data-Intensive Techniques -- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques -- 10.9 Conclusion -- References -- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine -- 11.1 Introduction -- 11.2 Related Works -- 11.3 Nomenclature -- 11.4 Formulation of Mathematical Model and Assumptions -- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) -- 1 11.6 Basic Reproduction Number and Equilibrium -- 11.7 Existence and Stability Analysis -- 11.8 Conclusion -- References -- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method -- 12.1 Introduction -- 12.2 Purpose and Goal of the Research -- 12.3 Relationship between the AI/Human Players and the System -- 12.4 Game-Related Information -- 12.4.1 Game Rules -- 12.4.2 Character Information -- 12.5 Approach -- 12.5.1 Rule-Based Method Structure -- 12.5.2 Rule Analysis of the Fighting Game Player -- 12.5.3 Methodology -- 12.6 Experiment -- 12.6.1 Environment and Settings -- 12.6.2 Results and Discussions -- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player -- 12.7 C onclusion -- References -- Chapter 13 Web-Based Smart Agriculture System -- 13.1 Introduction -- 13.2 Major Factors of Smart Agriculture -- 13.2.1 Increase in Agriculture Productivity -- 13.2.2 Minimizing Agriculture Greenhouse Gases -- 13.3 Ancient Farming Technology and Machinery -- 13.3.1 Old Techniques -- 13.3.2 Old Machinery -- 13.4 Drawbacks of Old Techniques -- 13.5 Tools Used For Smart Agriculture 13.5.1 GPS Locator Computer security |
title | Cyber defense mechanisms security, privacy, and challenges |
title_auth | Cyber defense mechanisms security, privacy, and challenges |
title_exact_search | Cyber defense mechanisms security, privacy, and challenges |
title_exact_search_txtP | Cyber defense mechanisms security, privacy, and challenges |
title_full | Cyber defense mechanisms security, privacy, and challenges edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong |
title_fullStr | Cyber defense mechanisms security, privacy, and challenges edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong |
title_full_unstemmed | Cyber defense mechanisms security, privacy, and challenges edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong |
title_short | Cyber defense mechanisms |
title_sort | cyber defense mechanisms security privacy and challenges |
title_sub | security, privacy, and challenges |
topic | Computer security |
topic_facet | Computer security |
work_keys_str_mv | AT kumargautam cyberdefensemechanismssecurityprivacyandchallenges AT sainidineshkumar cyberdefensemechanismssecurityprivacyandchallenges AT cuongnguyenhahuy cyberdefensemechanismssecurityprivacyandchallenges |