Implementing enterprise cyber security with open-source software and standard architecture: volume II
Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Gistrup, Denmark
River Publishers
[2023]
|
Schriftenreihe: | River Publishers Series in Digital Security and Forensics
|
Schlagworte: | |
Online-Zugang: | FHI01 https://public.ebookcentral.proquest.com/choice/PublicFullRecord.aspx?p=7253762 URL des Erstveröffentlichers EBSCOhost |
Zusammenfassung: | Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks |
Beschreibung: | Description based upon print version of record 3.16: Createa Data Frame |
Beschreibung: | 1 Online-Ressource (xxv, 245 Seiten) Illustrationen, Diagramme |
ISBN: | 1000922391 9788770227940 8770227942 9781000922394 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV049496197 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 240111s2023 |||| o||u| ||||||eng d | ||
020 | |a 1000922391 |9 1000922391 | ||
020 | |a 9788770227940 |9 9788770227940 | ||
020 | |a 8770227942 |9 8770227942 | ||
020 | |a 9781000922394 |9 9781000922394 | ||
035 | |a (OCoLC)1418710981 | ||
035 | |a (DE-599)BVBBV049496197 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 | ||
100 | 1 | |a Handa, Anand |e Verfasser |4 aut | |
245 | 1 | 0 | |a Implementing enterprise cyber security with open-source software and standard architecture |b volume II |
264 | 1 | |a Gistrup, Denmark |b River Publishers |c [2023] | |
300 | |a 1 Online-Ressource (xxv, 245 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a River Publishers Series in Digital Security and Forensics | |
500 | |a Description based upon print version of record | ||
500 | |a 3.16: Createa Data Frame | ||
505 | 8 | |a Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- List of Figures -- List of Tables -- List of Contributors -- List of Abbreviations -- Part I: Web Application Security -- Chapter 1: OWASP G0rKing -- Exploiting the Hidden Aspects of Google's Search Capabilities -- 1.1: Introduction -- 1.2: Literature Survey -- 1.2.1: What is google dorking? -- 1.2.2: A brief history of dorking -- 1.3: Purpose -- 1.4: Objective -- 1.4.1: Types of crawling -- 1.5: Technical Details -- 1.5.1: Google dorking techniques | |
505 | 8 | |a 1.6: Project SaUR0N -- One Tool to Search Them All -- 1.6.1: Project deliverables -- 1.7: Project Requirements Packages -- 1.8: Dorking Guide -- Tool User Manual -- 1.9: The Tool -- G0rKing aka SaUR0N -- 1.9.1: For simple google dorking (search) -- 1.9.2: For URL probing -- 1.10: Dorking Queries -- 1.10.1: Guide -- 1.11: Best Practices and Learnings -- 1.12: Website Security and Best Practices -- 1.13: Tool: SaUR0N -- 1.14: GitHub Repository -- Chapter 2: OSS Known Vulnerability Scanner -- Helping Software Developers Detect Third-Party Dependency Vulnerabilities in Real Time -- 2.1: Introduction | |
505 | 8 | |a 2.2: Background -- 2.3: Problem Statement -- 2.4: Tool Architecture -- 2.5: Tool Implementation -- 2.5.1: Components and their implementations -- 2.6: Deployment -- 2.6.1: Enterprise deployment -- 2.6.2: Standalone deployment -- 2.7: Tool Validation and Result -- 2.8: Conclusion -- 2.9: Acknowledgments -- Part II: Malware Analysis -- Chapter 3: Detecting Malware using Machine Learning -- 3.1: Introduction -- 3.2: Detecting Malware in JPEG Files -- 3.2.1: JPEG file structure -- 3.2.2: EXIF tags -- 3.3: Dataset -- 3.3.1: Dataset split -- train and test set -- 3.4: Feature Extraction Strategies | |
505 | 8 | |a 3.4.1: Strategy I: (using the length of the tags as features) -- 3.4.2: Strategy II: (forming TF-IDF) -- 3.5: Working of the System -- 3.6: Building the Model -- 3.6.1: Constants used -- 3.6.2: Functions used to extract EXIF tags from JPEG files -- 3.6.3: Example of EXIF tags -- 3.6.4: Unique keys extraction for all files -- 3.6.5: Preparation of data frame for creating TF-IDF -- 3.6.6: Forming theTF-IDF -- 3.6.7: Handling the imbalanced datasets -- 3.6.8: Development of decision tree model -- 3.6.9: Development of random forest model -- 3.7: Conclusions on the Model | |
505 | 8 | |a 3.8: Creating the Web Service -- 3.9: Creating a Simple Client Application -- 3.10: Sample of a Sophisticated Client Application -- 3.11: Detecting Malware in ELF Files -- 3.12: About ELF Files -- 3.12.1: ELF file header -- 3.12.2: Program header -- 3.12.3: Section information -- 3.12.4: ELF dataset -- 3.12.5: Distribution of dataset -- 3.13: Feature Engineering and Machine Learning Classification -- 3.14: Building the Model -- 3.14.1: Constants used -- 3.14.2: Functions used to extract information from ELF files -- 3.15: Extract the Unique List of Keys for All the Files | |
520 | 3 | |a Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. | |
520 | 3 | |a During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. | |
520 | 3 | |a This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks | |
653 | 0 | |a Computer security | |
653 | 0 | |a Open source software | |
653 | 0 | |a Sécurité informatique | |
653 | 0 | |a Logiciels libres | |
653 | 0 | |a Computer security | |
653 | 0 | |a Open source software | |
700 | 1 | |a Negi, Rohit |e Sonstige |4 oth | |
700 | 1 | |a Venkatesan, S. |e Sonstige |4 oth | |
700 | 1 | |a Shukla, Sandeep K. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Print version |a Handa, Anand |t Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II |d Milton : River Publishers,c2023 |z 9788770227957 |
856 | 4 | 0 | |u https://public.ebookcentral.proquest.com/choice/PublicFullRecord.aspx?p=7253762 |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/book/10078024 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3619675 |3 EBSCOhost |
912 | |a ZDB-37-RPEB | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034841419 | ||
966 | e | |u https://ieeexplore.ieee.org/book/10078024 |l FHI01 |p ZDB-37-RPEB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804186299134902272 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Handa, Anand |
author_facet | Handa, Anand |
author_role | aut |
author_sort | Handa, Anand |
author_variant | a h ah |
building | Verbundindex |
bvnumber | BV049496197 |
collection | ZDB-37-RPEB |
contents | Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- List of Figures -- List of Tables -- List of Contributors -- List of Abbreviations -- Part I: Web Application Security -- Chapter 1: OWASP G0rKing -- Exploiting the Hidden Aspects of Google's Search Capabilities -- 1.1: Introduction -- 1.2: Literature Survey -- 1.2.1: What is google dorking? -- 1.2.2: A brief history of dorking -- 1.3: Purpose -- 1.4: Objective -- 1.4.1: Types of crawling -- 1.5: Technical Details -- 1.5.1: Google dorking techniques 1.6: Project SaUR0N -- One Tool to Search Them All -- 1.6.1: Project deliverables -- 1.7: Project Requirements Packages -- 1.8: Dorking Guide -- Tool User Manual -- 1.9: The Tool -- G0rKing aka SaUR0N -- 1.9.1: For simple google dorking (search) -- 1.9.2: For URL probing -- 1.10: Dorking Queries -- 1.10.1: Guide -- 1.11: Best Practices and Learnings -- 1.12: Website Security and Best Practices -- 1.13: Tool: SaUR0N -- 1.14: GitHub Repository -- Chapter 2: OSS Known Vulnerability Scanner -- Helping Software Developers Detect Third-Party Dependency Vulnerabilities in Real Time -- 2.1: Introduction 2.2: Background -- 2.3: Problem Statement -- 2.4: Tool Architecture -- 2.5: Tool Implementation -- 2.5.1: Components and their implementations -- 2.6: Deployment -- 2.6.1: Enterprise deployment -- 2.6.2: Standalone deployment -- 2.7: Tool Validation and Result -- 2.8: Conclusion -- 2.9: Acknowledgments -- Part II: Malware Analysis -- Chapter 3: Detecting Malware using Machine Learning -- 3.1: Introduction -- 3.2: Detecting Malware in JPEG Files -- 3.2.1: JPEG file structure -- 3.2.2: EXIF tags -- 3.3: Dataset -- 3.3.1: Dataset split -- train and test set -- 3.4: Feature Extraction Strategies 3.4.1: Strategy I: (using the length of the tags as features) -- 3.4.2: Strategy II: (forming TF-IDF) -- 3.5: Working of the System -- 3.6: Building the Model -- 3.6.1: Constants used -- 3.6.2: Functions used to extract EXIF tags from JPEG files -- 3.6.3: Example of EXIF tags -- 3.6.4: Unique keys extraction for all files -- 3.6.5: Preparation of data frame for creating TF-IDF -- 3.6.6: Forming theTF-IDF -- 3.6.7: Handling the imbalanced datasets -- 3.6.8: Development of decision tree model -- 3.6.9: Development of random forest model -- 3.7: Conclusions on the Model 3.8: Creating the Web Service -- 3.9: Creating a Simple Client Application -- 3.10: Sample of a Sophisticated Client Application -- 3.11: Detecting Malware in ELF Files -- 3.12: About ELF Files -- 3.12.1: ELF file header -- 3.12.2: Program header -- 3.12.3: Section information -- 3.12.4: ELF dataset -- 3.12.5: Distribution of dataset -- 3.13: Feature Engineering and Machine Learning Classification -- 3.14: Building the Model -- 3.14.1: Constants used -- 3.14.2: Functions used to extract information from ELF files -- 3.15: Extract the Unique List of Keys for All the Files |
ctrlnum | (OCoLC)1418710981 (DE-599)BVBBV049496197 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07416nmm a2200601 c 4500</leader><controlfield tag="001">BV049496197</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240111s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000922391</subfield><subfield code="9">1000922391</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788770227940</subfield><subfield code="9">9788770227940</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8770227942</subfield><subfield code="9">8770227942</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000922394</subfield><subfield code="9">9781000922394</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1418710981</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049496197</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Handa, Anand</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing enterprise cyber security with open-source software and standard architecture</subfield><subfield code="b">volume II</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Gistrup, Denmark</subfield><subfield code="b">River Publishers</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxv, 245 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">River Publishers Series in Digital Security and Forensics</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">3.16: Createa Data Frame</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- List of Figures -- List of Tables -- List of Contributors -- List of Abbreviations -- Part I: Web Application Security -- Chapter 1: OWASP G0rKing -- Exploiting the Hidden Aspects of Google's Search Capabilities -- 1.1: Introduction -- 1.2: Literature Survey -- 1.2.1: What is google dorking? -- 1.2.2: A brief history of dorking -- 1.3: Purpose -- 1.4: Objective -- 1.4.1: Types of crawling -- 1.5: Technical Details -- 1.5.1: Google dorking techniques</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1.6: Project SaUR0N -- One Tool to Search Them All -- 1.6.1: Project deliverables -- 1.7: Project Requirements Packages -- 1.8: Dorking Guide -- Tool User Manual -- 1.9: The Tool -- G0rKing aka SaUR0N -- 1.9.1: For simple google dorking (search) -- 1.9.2: For URL probing -- 1.10: Dorking Queries -- 1.10.1: Guide -- 1.11: Best Practices and Learnings -- 1.12: Website Security and Best Practices -- 1.13: Tool: SaUR0N -- 1.14: GitHub Repository -- Chapter 2: OSS Known Vulnerability Scanner -- Helping Software Developers Detect Third-Party Dependency Vulnerabilities in Real Time -- 2.1: Introduction</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.2: Background -- 2.3: Problem Statement -- 2.4: Tool Architecture -- 2.5: Tool Implementation -- 2.5.1: Components and their implementations -- 2.6: Deployment -- 2.6.1: Enterprise deployment -- 2.6.2: Standalone deployment -- 2.7: Tool Validation and Result -- 2.8: Conclusion -- 2.9: Acknowledgments -- Part II: Malware Analysis -- Chapter 3: Detecting Malware using Machine Learning -- 3.1: Introduction -- 3.2: Detecting Malware in JPEG Files -- 3.2.1: JPEG file structure -- 3.2.2: EXIF tags -- 3.3: Dataset -- 3.3.1: Dataset split -- train and test set -- 3.4: Feature Extraction Strategies</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.4.1: Strategy I: (using the length of the tags as features) -- 3.4.2: Strategy II: (forming TF-IDF) -- 3.5: Working of the System -- 3.6: Building the Model -- 3.6.1: Constants used -- 3.6.2: Functions used to extract EXIF tags from JPEG files -- 3.6.3: Example of EXIF tags -- 3.6.4: Unique keys extraction for all files -- 3.6.5: Preparation of data frame for creating TF-IDF -- 3.6.6: Forming theTF-IDF -- 3.6.7: Handling the imbalanced datasets -- 3.6.8: Development of decision tree model -- 3.6.9: Development of random forest model -- 3.7: Conclusions on the Model</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.8: Creating the Web Service -- 3.9: Creating a Simple Client Application -- 3.10: Sample of a Sophisticated Client Application -- 3.11: Detecting Malware in ELF Files -- 3.12: About ELF Files -- 3.12.1: ELF file header -- 3.12.2: Program header -- 3.12.3: Section information -- 3.12.4: ELF dataset -- 3.12.5: Distribution of dataset -- 3.13: Feature Engineering and Machine Learning Classification -- 3.14: Building the Model -- 3.14.1: Constants used -- 3.14.2: Functions used to extract information from ELF files -- 3.15: Extract the Unique List of Keys for All the Files</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Open source software</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Logiciels libres</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Open source software</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Negi, Rohit</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Venkatesan, S.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shukla, Sandeep K.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version</subfield><subfield code="a">Handa, Anand</subfield><subfield code="t">Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II</subfield><subfield code="d">Milton : River Publishers,c2023</subfield><subfield code="z">9788770227957</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://public.ebookcentral.proquest.com/choice/PublicFullRecord.aspx?p=7253762</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/book/10078024</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3619675</subfield><subfield code="3">EBSCOhost</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-RPEB</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034841419</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/book/10078024</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-37-RPEB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049496197 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:20:28Z |
indexdate | 2024-07-10T10:08:55Z |
institution | BVB |
isbn | 1000922391 9788770227940 8770227942 9781000922394 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034841419 |
oclc_num | 1418710981 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | 1 Online-Ressource (xxv, 245 Seiten) Illustrationen, Diagramme |
psigel | ZDB-37-RPEB |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | River Publishers |
record_format | marc |
series2 | River Publishers Series in Digital Security and Forensics |
spelling | Handa, Anand Verfasser aut Implementing enterprise cyber security with open-source software and standard architecture volume II Gistrup, Denmark River Publishers [2023] 1 Online-Ressource (xxv, 245 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier River Publishers Series in Digital Security and Forensics Description based upon print version of record 3.16: Createa Data Frame Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- List of Figures -- List of Tables -- List of Contributors -- List of Abbreviations -- Part I: Web Application Security -- Chapter 1: OWASP G0rKing -- Exploiting the Hidden Aspects of Google's Search Capabilities -- 1.1: Introduction -- 1.2: Literature Survey -- 1.2.1: What is google dorking? -- 1.2.2: A brief history of dorking -- 1.3: Purpose -- 1.4: Objective -- 1.4.1: Types of crawling -- 1.5: Technical Details -- 1.5.1: Google dorking techniques 1.6: Project SaUR0N -- One Tool to Search Them All -- 1.6.1: Project deliverables -- 1.7: Project Requirements Packages -- 1.8: Dorking Guide -- Tool User Manual -- 1.9: The Tool -- G0rKing aka SaUR0N -- 1.9.1: For simple google dorking (search) -- 1.9.2: For URL probing -- 1.10: Dorking Queries -- 1.10.1: Guide -- 1.11: Best Practices and Learnings -- 1.12: Website Security and Best Practices -- 1.13: Tool: SaUR0N -- 1.14: GitHub Repository -- Chapter 2: OSS Known Vulnerability Scanner -- Helping Software Developers Detect Third-Party Dependency Vulnerabilities in Real Time -- 2.1: Introduction 2.2: Background -- 2.3: Problem Statement -- 2.4: Tool Architecture -- 2.5: Tool Implementation -- 2.5.1: Components and their implementations -- 2.6: Deployment -- 2.6.1: Enterprise deployment -- 2.6.2: Standalone deployment -- 2.7: Tool Validation and Result -- 2.8: Conclusion -- 2.9: Acknowledgments -- Part II: Malware Analysis -- Chapter 3: Detecting Malware using Machine Learning -- 3.1: Introduction -- 3.2: Detecting Malware in JPEG Files -- 3.2.1: JPEG file structure -- 3.2.2: EXIF tags -- 3.3: Dataset -- 3.3.1: Dataset split -- train and test set -- 3.4: Feature Extraction Strategies 3.4.1: Strategy I: (using the length of the tags as features) -- 3.4.2: Strategy II: (forming TF-IDF) -- 3.5: Working of the System -- 3.6: Building the Model -- 3.6.1: Constants used -- 3.6.2: Functions used to extract EXIF tags from JPEG files -- 3.6.3: Example of EXIF tags -- 3.6.4: Unique keys extraction for all files -- 3.6.5: Preparation of data frame for creating TF-IDF -- 3.6.6: Forming theTF-IDF -- 3.6.7: Handling the imbalanced datasets -- 3.6.8: Development of decision tree model -- 3.6.9: Development of random forest model -- 3.7: Conclusions on the Model 3.8: Creating the Web Service -- 3.9: Creating a Simple Client Application -- 3.10: Sample of a Sophisticated Client Application -- 3.11: Detecting Malware in ELF Files -- 3.12: About ELF Files -- 3.12.1: ELF file header -- 3.12.2: Program header -- 3.12.3: Section information -- 3.12.4: ELF dataset -- 3.12.5: Distribution of dataset -- 3.13: Feature Engineering and Machine Learning Classification -- 3.14: Building the Model -- 3.14.1: Constants used -- 3.14.2: Functions used to extract information from ELF files -- 3.15: Extract the Unique List of Keys for All the Files Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks Computer security Open source software Sécurité informatique Logiciels libres Negi, Rohit Sonstige oth Venkatesan, S. Sonstige oth Shukla, Sandeep K. Sonstige oth Print version Handa, Anand Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II Milton : River Publishers,c2023 9788770227957 https://public.ebookcentral.proquest.com/choice/PublicFullRecord.aspx?p=7253762 https://ieeexplore.ieee.org/book/10078024 Aggregator URL des Erstveröffentlichers Volltext https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3619675 EBSCOhost |
spellingShingle | Handa, Anand Implementing enterprise cyber security with open-source software and standard architecture volume II Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- List of Figures -- List of Tables -- List of Contributors -- List of Abbreviations -- Part I: Web Application Security -- Chapter 1: OWASP G0rKing -- Exploiting the Hidden Aspects of Google's Search Capabilities -- 1.1: Introduction -- 1.2: Literature Survey -- 1.2.1: What is google dorking? -- 1.2.2: A brief history of dorking -- 1.3: Purpose -- 1.4: Objective -- 1.4.1: Types of crawling -- 1.5: Technical Details -- 1.5.1: Google dorking techniques 1.6: Project SaUR0N -- One Tool to Search Them All -- 1.6.1: Project deliverables -- 1.7: Project Requirements Packages -- 1.8: Dorking Guide -- Tool User Manual -- 1.9: The Tool -- G0rKing aka SaUR0N -- 1.9.1: For simple google dorking (search) -- 1.9.2: For URL probing -- 1.10: Dorking Queries -- 1.10.1: Guide -- 1.11: Best Practices and Learnings -- 1.12: Website Security and Best Practices -- 1.13: Tool: SaUR0N -- 1.14: GitHub Repository -- Chapter 2: OSS Known Vulnerability Scanner -- Helping Software Developers Detect Third-Party Dependency Vulnerabilities in Real Time -- 2.1: Introduction 2.2: Background -- 2.3: Problem Statement -- 2.4: Tool Architecture -- 2.5: Tool Implementation -- 2.5.1: Components and their implementations -- 2.6: Deployment -- 2.6.1: Enterprise deployment -- 2.6.2: Standalone deployment -- 2.7: Tool Validation and Result -- 2.8: Conclusion -- 2.9: Acknowledgments -- Part II: Malware Analysis -- Chapter 3: Detecting Malware using Machine Learning -- 3.1: Introduction -- 3.2: Detecting Malware in JPEG Files -- 3.2.1: JPEG file structure -- 3.2.2: EXIF tags -- 3.3: Dataset -- 3.3.1: Dataset split -- train and test set -- 3.4: Feature Extraction Strategies 3.4.1: Strategy I: (using the length of the tags as features) -- 3.4.2: Strategy II: (forming TF-IDF) -- 3.5: Working of the System -- 3.6: Building the Model -- 3.6.1: Constants used -- 3.6.2: Functions used to extract EXIF tags from JPEG files -- 3.6.3: Example of EXIF tags -- 3.6.4: Unique keys extraction for all files -- 3.6.5: Preparation of data frame for creating TF-IDF -- 3.6.6: Forming theTF-IDF -- 3.6.7: Handling the imbalanced datasets -- 3.6.8: Development of decision tree model -- 3.6.9: Development of random forest model -- 3.7: Conclusions on the Model 3.8: Creating the Web Service -- 3.9: Creating a Simple Client Application -- 3.10: Sample of a Sophisticated Client Application -- 3.11: Detecting Malware in ELF Files -- 3.12: About ELF Files -- 3.12.1: ELF file header -- 3.12.2: Program header -- 3.12.3: Section information -- 3.12.4: ELF dataset -- 3.12.5: Distribution of dataset -- 3.13: Feature Engineering and Machine Learning Classification -- 3.14: Building the Model -- 3.14.1: Constants used -- 3.14.2: Functions used to extract information from ELF files -- 3.15: Extract the Unique List of Keys for All the Files |
title | Implementing enterprise cyber security with open-source software and standard architecture volume II |
title_auth | Implementing enterprise cyber security with open-source software and standard architecture volume II |
title_exact_search | Implementing enterprise cyber security with open-source software and standard architecture volume II |
title_exact_search_txtP | Implementing enterprise cyber security with open-source software and standard architecture volume II |
title_full | Implementing enterprise cyber security with open-source software and standard architecture volume II |
title_fullStr | Implementing enterprise cyber security with open-source software and standard architecture volume II |
title_full_unstemmed | Implementing enterprise cyber security with open-source software and standard architecture volume II |
title_short | Implementing enterprise cyber security with open-source software and standard architecture |
title_sort | implementing enterprise cyber security with open source software and standard architecture volume ii |
title_sub | volume II |
url | https://public.ebookcentral.proquest.com/choice/PublicFullRecord.aspx?p=7253762 https://ieeexplore.ieee.org/book/10078024 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3619675 |
work_keys_str_mv | AT handaanand implementingenterprisecybersecuritywithopensourcesoftwareandstandardarchitecturevolumeii AT negirohit implementingenterprisecybersecuritywithopensourcesoftwareandstandardarchitecturevolumeii AT venkatesans implementingenterprisecybersecuritywithopensourcesoftwareandstandardarchitecturevolumeii AT shuklasandeepk implementingenterprisecybersecuritywithopensourcesoftwareandstandardarchitecturevolumeii |