Cyber defense mechanisms security, privacy, and challenges

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Kumar, Gautam (HerausgeberIn), Saini, Dinesh Kumar (HerausgeberIn), Cuong, Nguyen Ha Huy (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Boca Raton ; London ; New York CRC Press 2021
Ausgabe:First edition
Schriftenreihe:Artificial Intelligence (AI): Elementary to advanced practices
Schlagworte:
Online-Zugang:DE-91
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV047441775
003 DE-604
005 20230818
007 cr|uuu---uuuuu
008 210827s2021 xx a||| o|||| 00||| eng d
020 |a 9781000171983  |9 978-1-00-017198-3 
020 |a 9780367816438  |9 978-0-367-81643-8 
035 |a (ZDB-30-PQE)EBC6266687 
035 |a (ZDB-30-PAD)EBC6266687 
035 |a (ZDB-89-EBL)EBL6266687 
035 |a (OCoLC)1203540544 
035 |a (DE-599)BVBBV047441775 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-91 
082 0 |a 5.8 
084 |a DAT 461  |2 stub 
245 1 0 |a Cyber defense mechanisms  |b security, privacy, and challenges  |c edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong 
250 |a First edition 
264 1 |a Boca Raton ; London ; New York  |b CRC Press  |c 2021 
264 4 |c ©2021 
300 |a 1 Online-Ressource  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Artificial Intelligence (AI): Elementary to advanced practices 
500 |a Description based on publisher supplied metadata and other sources 
505 8 |a Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps -- 1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats -- 1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation -- 2.3 Single-Access Optical Network Ring Architecture 
505 8 |a 2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer -- 3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack -- 4.4.3 Power Consumption Attack -- 4.4.4 Location Privacy -- 4.5 Performance Evaluation -- 4.5.1 Countermeasures in CR-WSN -- 4.6 Conclusion and Future Work -- References -- Chapter 5 Security Issues in IoT Networks -- 5.1 Introduction -- 5.2 Challenges for IoT Network -- 5.2.1 The Most Important Challenges in IoT Network -- 5.2.1.1 Schema Processing -- 5.2.1.2 Speed -- 5.2.1.3 The Value -- 5.2.1.4 The Security -- 5.3 Elements for the Internet of Things (IoT) -- 5.4 Cases and Scenarios for IoT Network -- 5.4.1 Clustering -- 5.4.2 Tracking -- 5.4.3 Tactical Networks and High Dynamic Network -- 5.5 The Vision of Internet of Things (IoT) -- 5.6 Software-Defined IoT -- 5.7 IoT Architecture -- 5.8 Algorithm for Internet of Things (IoT) 
505 8 |a 5.9 Business Context of the IoT -- 5.10 IoT Device Information Collection Process -- 5.11 Introduction to IoT Security -- 5.12 D evelopment of IoT Security Mechanisms -- 5.13 Security Attacks in IoT -- 5.14 IoT Security Challenges -- 5.14.1 IoT Security Risks and Challenges -- 5.14.2 IoT Security Requirements -- 5.15 Conclusion -- References -- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario -- 6.1 IoT Ecosystem History -- 6.2 IoT Ecosystem -- 6.2.1 Building an IoT Ecosystem -- 6.3 Challenges in Building an Ecosystem -- 6.4 IoT Ecosystem Implications -- 6.5 IoT Security Implications -- 6.6 Current IoT Security Scenario and Trends -- 6.6.1 Why These Are Not Enough -- 6.6.2 The Ideal Security System -- 6.7 A Solution-Blockchain Technology -- 6.7.1 Implementing Blockchain in an IoT Ecosystem -- 6.8 Conclusion -- References -- Chapter 7 Design Principles and Privacy in Cloud Computing -- 7.1 Introduction -- 7.1.1 Evolution of Cloud Computing -- 7.1.2 Applications of Cloud Computing in Various Domains -- 7.1.3 Generalized Architecture for Cloud Computing -- 7.1.4 Design Principles in Cloud Computing -- 7.1.5 Privacy Issues in Cloud Computing -- 7.1.6 Chapter Outline -- 7.2 Security Requirements and Attacks in Cloud Computing -- 7.2.1 Threat Model -- 7.2.2 Security Requirements in Cloud Computing -- 7.2.3 Security Attacks in Cloud Computing -- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing -- 7.3.1 Key Management -- 7.3.2 User Authentication/Device Authentication -- 7.3.3 Access Control/User Access Control -- 7.3.4 Intrusion Detection -- 7.3.5 Privacy Preservation -- 7.4 Challenges and Future Research Directions -- 7.4.1 Design of Lightweight Security Protocols -- 7.4.2 Securing Data Mining Methods -- 7.4.3 Granular Auditing -- 7.4.4 Blockchain-Based Decentralized Mechanisms -- 7.5 Conclusion 
505 8 |a Bibliography -- Chapter 8 Big Data Analysis on Smart Tools and Techniques -- 8.1 Introduction -- 8.2 Big Data Challenges -- 8.3 Big Data Analysis Techniques and Tools -- 8.3.1 Data Mining -- 8.3.2 Web Mining -- 8.3.3 Visualization Methods -- 8.3.4 Machine Learning -- 8.3.5 Multilayer Perceptron (MLP) -- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) -- 8.3.7 Support Vector Machine (SVM) -- 8.3.8 Optimization Methods -- 8.3.9 Stochastic Optimization -- 8.3.10 Deterministic Optimization -- 8.4 Related Work -- 8.5 Discussion and Conclusion -- 8.5.1 Discussion -- 8.5.2 Conclusion -- References -- Chapter 9 Lightweight Security Protocols for Blockchain Technology -- 9.1 Introduction -- 9.2 Blockchain Technology Design Space -- 9.3 Consensus -- 9.3.1 Distinct Features of Blockchain Distributed Architecture -- 9.4 Practical Applications of Blockchain -- 9.5 Advantages and Disadvantages of Blockchain -- 9.5.1 Advantages -- 9.5.2 Disadvantages -- 9.6 Limitations and Drawbacks of Blockchain -- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology -- 9.7.1 Comparison of Security and Functionality Features -- 9.7.2 Comparison of Communication Costs -- 9.7.3 Comparison of Computation Costs -- 9.8 Deployment and Implementation of Testbeds for Blockchain -- 9.9 Conclusion -- Acknowledgments -- Bibliography -- Chapter 10 Privacy and Challenges to Data-Intensive Techniques -- 10.1 Introduction -- 10.2 Advantages of Cybersecurity -- 10.3 Approach and Workflow -- 10.3.1 Common Steps in Cybersecurity -- 10.3.2 Set Up Your Risk Management Regime -- 10.4 Cybersecurity Principles and Goals -- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution -- 10.5.1 Confidentiality -- 10.5.1.1 Tools for Confidentiality -- 10.5.2 Integrity -- 10.5.2.1 Tools for Integrity -- 10.5.3 Availability -- 10.5.3.1 Tools of Availability 
505 8 |a 10.5.4 Challenges of Cybersecurity -- 10.5.5 Data Security Consideration -- 10.6 Privacy Preservation -- 10.6.1 Privacy in Cybersecurity -- 10.6.2 Data-Intensive Technology -- 10.7 Challenges in Data-Intensive Techniques -- 10.8 Cybersecurity to Data-Intensive Techniques -- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques -- 10.9 Conclusion -- References -- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine -- 11.1 Introduction -- 11.2 Related Works -- 11.3 Nomenclature -- 11.4 Formulation of Mathematical Model and Assumptions -- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) -- 1 11.6 Basic Reproduction Number and Equilibrium -- 11.7 Existence and Stability Analysis -- 11.8 Conclusion -- References -- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method -- 12.1 Introduction -- 12.2 Purpose and Goal of the Research -- 12.3 Relationship between the AI/Human Players and the System -- 12.4 Game-Related Information -- 12.4.1 Game Rules -- 12.4.2 Character Information -- 12.5 Approach -- 12.5.1 Rule-Based Method Structure -- 12.5.2 Rule Analysis of the Fighting Game Player -- 12.5.3 Methodology -- 12.6 Experiment -- 12.6.1 Environment and Settings -- 12.6.2 Results and Discussions -- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player -- 12.7 C onclusion -- References -- Chapter 13 Web-Based Smart Agriculture System -- 13.1 Introduction -- 13.2 Major Factors of Smart Agriculture -- 13.2.1 Increase in Agriculture Productivity -- 13.2.2 Minimizing Agriculture Greenhouse Gases -- 13.3 Ancient Farming Technology and Machinery -- 13.3.1 Old Techniques -- 13.3.2 Old Machinery -- 13.4 Drawbacks of Old Techniques -- 13.5 Tools Used For Smart Agriculture 
505 8 |a 13.5.1 GPS Locator 
650 4 |a Computer security 
700 1 |a Kumar, Gautam  |4 edt 
700 1 |a Saini, Dinesh Kumar  |4 edt 
700 1 |a Cuong, Nguyen Ha Huy  |4 edt 
776 0 8 |i Erscheint auch als  |a Kumar, Gautam  |t Cyber Defense Mechanisms  |d Milton : Taylor & Francis Group,c2020  |n Druck-Ausgabe, Hardcover  |z 978-0-367-40883-1 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe, Paperback  |z 978-0-367-54096-8 
912 |a ZDB-30-PQE 
943 1 |a oai:aleph.bib-bvb.de:BVB01-032843927 
966 e |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6266687  |l DE-91  |p ZDB-30-PQE  |q TUM_PDA_PQE_Kauf  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1819311355082047488
any_adam_object
author2 Kumar, Gautam
Saini, Dinesh Kumar
Cuong, Nguyen Ha Huy
author2_role edt
edt
edt
author2_variant g k gk
d k s dk dks
n h h c nhh nhhc
author_facet Kumar, Gautam
Saini, Dinesh Kumar
Cuong, Nguyen Ha Huy
building Verbundindex
bvnumber BV047441775
classification_tum DAT 461
collection ZDB-30-PQE
contents Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps -- 1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats -- 1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation -- 2.3 Single-Access Optical Network Ring Architecture
2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer -- 3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack -- 4.4.3 Power Consumption Attack -- 4.4.4 Location Privacy -- 4.5 Performance Evaluation -- 4.5.1 Countermeasures in CR-WSN -- 4.6 Conclusion and Future Work -- References -- Chapter 5 Security Issues in IoT Networks -- 5.1 Introduction -- 5.2 Challenges for IoT Network -- 5.2.1 The Most Important Challenges in IoT Network -- 5.2.1.1 Schema Processing -- 5.2.1.2 Speed -- 5.2.1.3 The Value -- 5.2.1.4 The Security -- 5.3 Elements for the Internet of Things (IoT) -- 5.4 Cases and Scenarios for IoT Network -- 5.4.1 Clustering -- 5.4.2 Tracking -- 5.4.3 Tactical Networks and High Dynamic Network -- 5.5 The Vision of Internet of Things (IoT) -- 5.6 Software-Defined IoT -- 5.7 IoT Architecture -- 5.8 Algorithm for Internet of Things (IoT)
5.9 Business Context of the IoT -- 5.10 IoT Device Information Collection Process -- 5.11 Introduction to IoT Security -- 5.12 D evelopment of IoT Security Mechanisms -- 5.13 Security Attacks in IoT -- 5.14 IoT Security Challenges -- 5.14.1 IoT Security Risks and Challenges -- 5.14.2 IoT Security Requirements -- 5.15 Conclusion -- References -- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario -- 6.1 IoT Ecosystem History -- 6.2 IoT Ecosystem -- 6.2.1 Building an IoT Ecosystem -- 6.3 Challenges in Building an Ecosystem -- 6.4 IoT Ecosystem Implications -- 6.5 IoT Security Implications -- 6.6 Current IoT Security Scenario and Trends -- 6.6.1 Why These Are Not Enough -- 6.6.2 The Ideal Security System -- 6.7 A Solution-Blockchain Technology -- 6.7.1 Implementing Blockchain in an IoT Ecosystem -- 6.8 Conclusion -- References -- Chapter 7 Design Principles and Privacy in Cloud Computing -- 7.1 Introduction -- 7.1.1 Evolution of Cloud Computing -- 7.1.2 Applications of Cloud Computing in Various Domains -- 7.1.3 Generalized Architecture for Cloud Computing -- 7.1.4 Design Principles in Cloud Computing -- 7.1.5 Privacy Issues in Cloud Computing -- 7.1.6 Chapter Outline -- 7.2 Security Requirements and Attacks in Cloud Computing -- 7.2.1 Threat Model -- 7.2.2 Security Requirements in Cloud Computing -- 7.2.3 Security Attacks in Cloud Computing -- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing -- 7.3.1 Key Management -- 7.3.2 User Authentication/Device Authentication -- 7.3.3 Access Control/User Access Control -- 7.3.4 Intrusion Detection -- 7.3.5 Privacy Preservation -- 7.4 Challenges and Future Research Directions -- 7.4.1 Design of Lightweight Security Protocols -- 7.4.2 Securing Data Mining Methods -- 7.4.3 Granular Auditing -- 7.4.4 Blockchain-Based Decentralized Mechanisms -- 7.5 Conclusion
Bibliography -- Chapter 8 Big Data Analysis on Smart Tools and Techniques -- 8.1 Introduction -- 8.2 Big Data Challenges -- 8.3 Big Data Analysis Techniques and Tools -- 8.3.1 Data Mining -- 8.3.2 Web Mining -- 8.3.3 Visualization Methods -- 8.3.4 Machine Learning -- 8.3.5 Multilayer Perceptron (MLP) -- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) -- 8.3.7 Support Vector Machine (SVM) -- 8.3.8 Optimization Methods -- 8.3.9 Stochastic Optimization -- 8.3.10 Deterministic Optimization -- 8.4 Related Work -- 8.5 Discussion and Conclusion -- 8.5.1 Discussion -- 8.5.2 Conclusion -- References -- Chapter 9 Lightweight Security Protocols for Blockchain Technology -- 9.1 Introduction -- 9.2 Blockchain Technology Design Space -- 9.3 Consensus -- 9.3.1 Distinct Features of Blockchain Distributed Architecture -- 9.4 Practical Applications of Blockchain -- 9.5 Advantages and Disadvantages of Blockchain -- 9.5.1 Advantages -- 9.5.2 Disadvantages -- 9.6 Limitations and Drawbacks of Blockchain -- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology -- 9.7.1 Comparison of Security and Functionality Features -- 9.7.2 Comparison of Communication Costs -- 9.7.3 Comparison of Computation Costs -- 9.8 Deployment and Implementation of Testbeds for Blockchain -- 9.9 Conclusion -- Acknowledgments -- Bibliography -- Chapter 10 Privacy and Challenges to Data-Intensive Techniques -- 10.1 Introduction -- 10.2 Advantages of Cybersecurity -- 10.3 Approach and Workflow -- 10.3.1 Common Steps in Cybersecurity -- 10.3.2 Set Up Your Risk Management Regime -- 10.4 Cybersecurity Principles and Goals -- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution -- 10.5.1 Confidentiality -- 10.5.1.1 Tools for Confidentiality -- 10.5.2 Integrity -- 10.5.2.1 Tools for Integrity -- 10.5.3 Availability -- 10.5.3.1 Tools of Availability
10.5.4 Challenges of Cybersecurity -- 10.5.5 Data Security Consideration -- 10.6 Privacy Preservation -- 10.6.1 Privacy in Cybersecurity -- 10.6.2 Data-Intensive Technology -- 10.7 Challenges in Data-Intensive Techniques -- 10.8 Cybersecurity to Data-Intensive Techniques -- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques -- 10.9 Conclusion -- References -- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine -- 11.1 Introduction -- 11.2 Related Works -- 11.3 Nomenclature -- 11.4 Formulation of Mathematical Model and Assumptions -- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) -- 1 11.6 Basic Reproduction Number and Equilibrium -- 11.7 Existence and Stability Analysis -- 11.8 Conclusion -- References -- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method -- 12.1 Introduction -- 12.2 Purpose and Goal of the Research -- 12.3 Relationship between the AI/Human Players and the System -- 12.4 Game-Related Information -- 12.4.1 Game Rules -- 12.4.2 Character Information -- 12.5 Approach -- 12.5.1 Rule-Based Method Structure -- 12.5.2 Rule Analysis of the Fighting Game Player -- 12.5.3 Methodology -- 12.6 Experiment -- 12.6.1 Environment and Settings -- 12.6.2 Results and Discussions -- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player -- 12.7 C onclusion -- References -- Chapter 13 Web-Based Smart Agriculture System -- 13.1 Introduction -- 13.2 Major Factors of Smart Agriculture -- 13.2.1 Increase in Agriculture Productivity -- 13.2.2 Minimizing Agriculture Greenhouse Gases -- 13.3 Ancient Farming Technology and Machinery -- 13.3.1 Old Techniques -- 13.3.2 Old Machinery -- 13.4 Drawbacks of Old Techniques -- 13.5 Tools Used For Smart Agriculture
13.5.1 GPS Locator
ctrlnum (ZDB-30-PQE)EBC6266687
(ZDB-30-PAD)EBC6266687
(ZDB-89-EBL)EBL6266687
(OCoLC)1203540544
(DE-599)BVBBV047441775
dewey-full 5.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 5.8
dewey-search 5.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition First edition
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11248nam a2200529zc 4500</leader><controlfield tag="001">BV047441775</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230818 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210827s2021 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000171983</subfield><subfield code="9">978-1-00-017198-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367816438</subfield><subfield code="9">978-0-367-81643-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6266687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6266687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6266687</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1203540544</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047441775</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">5.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber defense mechanisms</subfield><subfield code="b">security, privacy, and challenges</subfield><subfield code="c">edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artificial Intelligence (AI): Elementary to advanced practices</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps -- 1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats -- 1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation -- 2.3 Single-Access Optical Network Ring Architecture</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer -- 3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack -- 4.4.3 Power Consumption Attack -- 4.4.4 Location Privacy -- 4.5 Performance Evaluation -- 4.5.1 Countermeasures in CR-WSN -- 4.6 Conclusion and Future Work -- References -- Chapter 5 Security Issues in IoT Networks -- 5.1 Introduction -- 5.2 Challenges for IoT Network -- 5.2.1 The Most Important Challenges in IoT Network -- 5.2.1.1 Schema Processing -- 5.2.1.2 Speed -- 5.2.1.3 The Value -- 5.2.1.4 The Security -- 5.3 Elements for the Internet of Things (IoT) -- 5.4 Cases and Scenarios for IoT Network -- 5.4.1 Clustering -- 5.4.2 Tracking -- 5.4.3 Tactical Networks and High Dynamic Network -- 5.5 The Vision of Internet of Things (IoT) -- 5.6 Software-Defined IoT -- 5.7 IoT Architecture -- 5.8 Algorithm for Internet of Things (IoT)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.9 Business Context of the IoT -- 5.10 IoT Device Information Collection Process -- 5.11 Introduction to IoT Security -- 5.12 D evelopment of IoT Security Mechanisms -- 5.13 Security Attacks in IoT -- 5.14 IoT Security Challenges -- 5.14.1 IoT Security Risks and Challenges -- 5.14.2 IoT Security Requirements -- 5.15 Conclusion -- References -- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario -- 6.1 IoT Ecosystem History -- 6.2 IoT Ecosystem -- 6.2.1 Building an IoT Ecosystem -- 6.3 Challenges in Building an Ecosystem -- 6.4 IoT Ecosystem Implications -- 6.5 IoT Security Implications -- 6.6 Current IoT Security Scenario and Trends -- 6.6.1 Why These Are Not Enough -- 6.6.2 The Ideal Security System -- 6.7 A Solution-Blockchain Technology -- 6.7.1 Implementing Blockchain in an IoT Ecosystem -- 6.8 Conclusion -- References -- Chapter 7 Design Principles and Privacy in Cloud Computing -- 7.1 Introduction -- 7.1.1 Evolution of Cloud Computing -- 7.1.2 Applications of Cloud Computing in Various Domains -- 7.1.3 Generalized Architecture for Cloud Computing -- 7.1.4 Design Principles in Cloud Computing -- 7.1.5 Privacy Issues in Cloud Computing -- 7.1.6 Chapter Outline -- 7.2 Security Requirements and Attacks in Cloud Computing -- 7.2.1 Threat Model -- 7.2.2 Security Requirements in Cloud Computing -- 7.2.3 Security Attacks in Cloud Computing -- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing -- 7.3.1 Key Management -- 7.3.2 User Authentication/Device Authentication -- 7.3.3 Access Control/User Access Control -- 7.3.4 Intrusion Detection -- 7.3.5 Privacy Preservation -- 7.4 Challenges and Future Research Directions -- 7.4.1 Design of Lightweight Security Protocols -- 7.4.2 Securing Data Mining Methods -- 7.4.3 Granular Auditing -- 7.4.4 Blockchain-Based Decentralized Mechanisms -- 7.5 Conclusion</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Bibliography -- Chapter 8 Big Data Analysis on Smart Tools and Techniques -- 8.1 Introduction -- 8.2 Big Data Challenges -- 8.3 Big Data Analysis Techniques and Tools -- 8.3.1 Data Mining -- 8.3.2 Web Mining -- 8.3.3 Visualization Methods -- 8.3.4 Machine Learning -- 8.3.5 Multilayer Perceptron (MLP) -- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) -- 8.3.7 Support Vector Machine (SVM) -- 8.3.8 Optimization Methods -- 8.3.9 Stochastic Optimization -- 8.3.10 Deterministic Optimization -- 8.4 Related Work -- 8.5 Discussion and Conclusion -- 8.5.1 Discussion -- 8.5.2 Conclusion -- References -- Chapter 9 Lightweight Security Protocols for Blockchain Technology -- 9.1 Introduction -- 9.2 Blockchain Technology Design Space -- 9.3 Consensus -- 9.3.1 Distinct Features of Blockchain Distributed Architecture -- 9.4 Practical Applications of Blockchain -- 9.5 Advantages and Disadvantages of Blockchain -- 9.5.1 Advantages -- 9.5.2 Disadvantages -- 9.6 Limitations and Drawbacks of Blockchain -- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology -- 9.7.1 Comparison of Security and Functionality Features -- 9.7.2 Comparison of Communication Costs -- 9.7.3 Comparison of Computation Costs -- 9.8 Deployment and Implementation of Testbeds for Blockchain -- 9.9 Conclusion -- Acknowledgments -- Bibliography -- Chapter 10 Privacy and Challenges to Data-Intensive Techniques -- 10.1 Introduction -- 10.2 Advantages of Cybersecurity -- 10.3 Approach and Workflow -- 10.3.1 Common Steps in Cybersecurity -- 10.3.2 Set Up Your Risk Management Regime -- 10.4 Cybersecurity Principles and Goals -- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution -- 10.5.1 Confidentiality -- 10.5.1.1 Tools for Confidentiality -- 10.5.2 Integrity -- 10.5.2.1 Tools for Integrity -- 10.5.3 Availability -- 10.5.3.1 Tools of Availability</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">10.5.4 Challenges of Cybersecurity -- 10.5.5 Data Security Consideration -- 10.6 Privacy Preservation -- 10.6.1 Privacy in Cybersecurity -- 10.6.2 Data-Intensive Technology -- 10.7 Challenges in Data-Intensive Techniques -- 10.8 Cybersecurity to Data-Intensive Techniques -- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques -- 10.9 Conclusion -- References -- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine -- 11.1 Introduction -- 11.2 Related Works -- 11.3 Nomenclature -- 11.4 Formulation of Mathematical Model and Assumptions -- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) -- 1 11.6 Basic Reproduction Number and Equilibrium -- 11.7 Existence and Stability Analysis -- 11.8 Conclusion -- References -- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method -- 12.1 Introduction -- 12.2 Purpose and Goal of the Research -- 12.3 Relationship between the AI/Human Players and the System -- 12.4 Game-Related Information -- 12.4.1 Game Rules -- 12.4.2 Character Information -- 12.5 Approach -- 12.5.1 Rule-Based Method Structure -- 12.5.2 Rule Analysis of the Fighting Game Player -- 12.5.3 Methodology -- 12.6 Experiment -- 12.6.1 Environment and Settings -- 12.6.2 Results and Discussions -- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player -- 12.7 C onclusion -- References -- Chapter 13 Web-Based Smart Agriculture System -- 13.1 Introduction -- 13.2 Major Factors of Smart Agriculture -- 13.2.1 Increase in Agriculture Productivity -- 13.2.2 Minimizing Agriculture Greenhouse Gases -- 13.3 Ancient Farming Technology and Machinery -- 13.3.1 Old Techniques -- 13.3.2 Old Machinery -- 13.4 Drawbacks of Old Techniques -- 13.5 Tools Used For Smart Agriculture</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">13.5.1 GPS Locator</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Gautam</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saini, Dinesh Kumar</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cuong, Nguyen Ha Huy</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="a">Kumar, Gautam</subfield><subfield code="t">Cyber Defense Mechanisms</subfield><subfield code="d">Milton : Taylor &amp; Francis Group,c2020</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-367-40883-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-367-54096-8</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032843927</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6266687</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_PDA_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV047441775
illustrated Illustrated
indexdate 2024-12-24T08:55:12Z
institution BVB
isbn 9781000171983
9780367816438
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032843927
oclc_num 1203540544
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 Online-Ressource Illustrationen, Diagramme
psigel ZDB-30-PQE
ZDB-30-PQE TUM_PDA_PQE_Kauf
publishDate 2021
publishDateSearch 2021
publishDateSort 2021
publisher CRC Press
record_format marc
series2 Artificial Intelligence (AI): Elementary to advanced practices
spelling Cyber defense mechanisms security, privacy, and challenges edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong
First edition
Boca Raton ; London ; New York CRC Press 2021
©2021
1 Online-Ressource Illustrationen, Diagramme
txt rdacontent
c rdamedia
cr rdacarrier
Artificial Intelligence (AI): Elementary to advanced practices
Description based on publisher supplied metadata and other sources
Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps -- 1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats -- 1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation -- 2.3 Single-Access Optical Network Ring Architecture
2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer -- 3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack -- 4.4.3 Power Consumption Attack -- 4.4.4 Location Privacy -- 4.5 Performance Evaluation -- 4.5.1 Countermeasures in CR-WSN -- 4.6 Conclusion and Future Work -- References -- Chapter 5 Security Issues in IoT Networks -- 5.1 Introduction -- 5.2 Challenges for IoT Network -- 5.2.1 The Most Important Challenges in IoT Network -- 5.2.1.1 Schema Processing -- 5.2.1.2 Speed -- 5.2.1.3 The Value -- 5.2.1.4 The Security -- 5.3 Elements for the Internet of Things (IoT) -- 5.4 Cases and Scenarios for IoT Network -- 5.4.1 Clustering -- 5.4.2 Tracking -- 5.4.3 Tactical Networks and High Dynamic Network -- 5.5 The Vision of Internet of Things (IoT) -- 5.6 Software-Defined IoT -- 5.7 IoT Architecture -- 5.8 Algorithm for Internet of Things (IoT)
5.9 Business Context of the IoT -- 5.10 IoT Device Information Collection Process -- 5.11 Introduction to IoT Security -- 5.12 D evelopment of IoT Security Mechanisms -- 5.13 Security Attacks in IoT -- 5.14 IoT Security Challenges -- 5.14.1 IoT Security Risks and Challenges -- 5.14.2 IoT Security Requirements -- 5.15 Conclusion -- References -- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario -- 6.1 IoT Ecosystem History -- 6.2 IoT Ecosystem -- 6.2.1 Building an IoT Ecosystem -- 6.3 Challenges in Building an Ecosystem -- 6.4 IoT Ecosystem Implications -- 6.5 IoT Security Implications -- 6.6 Current IoT Security Scenario and Trends -- 6.6.1 Why These Are Not Enough -- 6.6.2 The Ideal Security System -- 6.7 A Solution-Blockchain Technology -- 6.7.1 Implementing Blockchain in an IoT Ecosystem -- 6.8 Conclusion -- References -- Chapter 7 Design Principles and Privacy in Cloud Computing -- 7.1 Introduction -- 7.1.1 Evolution of Cloud Computing -- 7.1.2 Applications of Cloud Computing in Various Domains -- 7.1.3 Generalized Architecture for Cloud Computing -- 7.1.4 Design Principles in Cloud Computing -- 7.1.5 Privacy Issues in Cloud Computing -- 7.1.6 Chapter Outline -- 7.2 Security Requirements and Attacks in Cloud Computing -- 7.2.1 Threat Model -- 7.2.2 Security Requirements in Cloud Computing -- 7.2.3 Security Attacks in Cloud Computing -- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing -- 7.3.1 Key Management -- 7.3.2 User Authentication/Device Authentication -- 7.3.3 Access Control/User Access Control -- 7.3.4 Intrusion Detection -- 7.3.5 Privacy Preservation -- 7.4 Challenges and Future Research Directions -- 7.4.1 Design of Lightweight Security Protocols -- 7.4.2 Securing Data Mining Methods -- 7.4.3 Granular Auditing -- 7.4.4 Blockchain-Based Decentralized Mechanisms -- 7.5 Conclusion
Bibliography -- Chapter 8 Big Data Analysis on Smart Tools and Techniques -- 8.1 Introduction -- 8.2 Big Data Challenges -- 8.3 Big Data Analysis Techniques and Tools -- 8.3.1 Data Mining -- 8.3.2 Web Mining -- 8.3.3 Visualization Methods -- 8.3.4 Machine Learning -- 8.3.5 Multilayer Perceptron (MLP) -- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) -- 8.3.7 Support Vector Machine (SVM) -- 8.3.8 Optimization Methods -- 8.3.9 Stochastic Optimization -- 8.3.10 Deterministic Optimization -- 8.4 Related Work -- 8.5 Discussion and Conclusion -- 8.5.1 Discussion -- 8.5.2 Conclusion -- References -- Chapter 9 Lightweight Security Protocols for Blockchain Technology -- 9.1 Introduction -- 9.2 Blockchain Technology Design Space -- 9.3 Consensus -- 9.3.1 Distinct Features of Blockchain Distributed Architecture -- 9.4 Practical Applications of Blockchain -- 9.5 Advantages and Disadvantages of Blockchain -- 9.5.1 Advantages -- 9.5.2 Disadvantages -- 9.6 Limitations and Drawbacks of Blockchain -- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology -- 9.7.1 Comparison of Security and Functionality Features -- 9.7.2 Comparison of Communication Costs -- 9.7.3 Comparison of Computation Costs -- 9.8 Deployment and Implementation of Testbeds for Blockchain -- 9.9 Conclusion -- Acknowledgments -- Bibliography -- Chapter 10 Privacy and Challenges to Data-Intensive Techniques -- 10.1 Introduction -- 10.2 Advantages of Cybersecurity -- 10.3 Approach and Workflow -- 10.3.1 Common Steps in Cybersecurity -- 10.3.2 Set Up Your Risk Management Regime -- 10.4 Cybersecurity Principles and Goals -- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution -- 10.5.1 Confidentiality -- 10.5.1.1 Tools for Confidentiality -- 10.5.2 Integrity -- 10.5.2.1 Tools for Integrity -- 10.5.3 Availability -- 10.5.3.1 Tools of Availability
10.5.4 Challenges of Cybersecurity -- 10.5.5 Data Security Consideration -- 10.6 Privacy Preservation -- 10.6.1 Privacy in Cybersecurity -- 10.6.2 Data-Intensive Technology -- 10.7 Challenges in Data-Intensive Techniques -- 10.8 Cybersecurity to Data-Intensive Techniques -- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques -- 10.9 Conclusion -- References -- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine -- 11.1 Introduction -- 11.2 Related Works -- 11.3 Nomenclature -- 11.4 Formulation of Mathematical Model and Assumptions -- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) -- 1 11.6 Basic Reproduction Number and Equilibrium -- 11.7 Existence and Stability Analysis -- 11.8 Conclusion -- References -- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method -- 12.1 Introduction -- 12.2 Purpose and Goal of the Research -- 12.3 Relationship between the AI/Human Players and the System -- 12.4 Game-Related Information -- 12.4.1 Game Rules -- 12.4.2 Character Information -- 12.5 Approach -- 12.5.1 Rule-Based Method Structure -- 12.5.2 Rule Analysis of the Fighting Game Player -- 12.5.3 Methodology -- 12.6 Experiment -- 12.6.1 Environment and Settings -- 12.6.2 Results and Discussions -- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player -- 12.7 C onclusion -- References -- Chapter 13 Web-Based Smart Agriculture System -- 13.1 Introduction -- 13.2 Major Factors of Smart Agriculture -- 13.2.1 Increase in Agriculture Productivity -- 13.2.2 Minimizing Agriculture Greenhouse Gases -- 13.3 Ancient Farming Technology and Machinery -- 13.3.1 Old Techniques -- 13.3.2 Old Machinery -- 13.4 Drawbacks of Old Techniques -- 13.5 Tools Used For Smart Agriculture
13.5.1 GPS Locator
Computer security
Kumar, Gautam edt
Saini, Dinesh Kumar edt
Cuong, Nguyen Ha Huy edt
Erscheint auch als Kumar, Gautam Cyber Defense Mechanisms Milton : Taylor & Francis Group,c2020 Druck-Ausgabe, Hardcover 978-0-367-40883-1
Erscheint auch als Druck-Ausgabe, Paperback 978-0-367-54096-8
spellingShingle Cyber defense mechanisms security, privacy, and challenges
Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies -- 1.1 Introduction -- 1.2 History of Security Breaches -- 1.3 Common Security Threats -- 1.3.1 Malware -- 1.3.2 Phishing -- 1.3.3 Spear Phishing -- 1.3.4 "Man in the Middle" (MitM) Attack -- 1.3.5 Trojans -- 1.3.6 Ransomware -- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS) -- 1.3.8 Attacks on IoT Devices -- 1.3.9 Data Breaches -- 1.3.10 Malware on Mobile Apps -- 1.4 Security Challenges in Modern Day -- 1.4.1 Cloud Computing -- 1.4.2 Social Media -- 1.4.3 Smart Phones -- 1.4.4 General Data Protection Regulations (GDPR) -- 1.4.5 Attacks Based on Machine Learning and AI -- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems -- 1.4.7 Switching to DevOps -- 1.4.8 Biometric Authentication -- 1.4.9 Fileless Malware -- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT) -- 1.5.1 How an APT Attack Works -- 1.5.2 Some Instances of APTs -- 1.5.3 Characteristics of APTs -- 1.6 Prevention Measures -- 1.6.1 Identify the Threats -- 1.6.2 Beware of Cybercrimes -- 1.6.3 Observe All Stakeholders -- 1.6.4 Usage of Two-Factor Authentication -- 1.6.5 Conduct Regular Audits -- 1.6.6 Draft a Credit Sign-Off Policy -- 1.6.7 Protect Vital Data -- 1.6.8 Perform Risk Assessments -- 1.6.9 Insure against Cybercrime -- 1.6.10 Gather In-Depth Knowledge about Risk Factors -- 1.7 Threat Modeling -- 1.8 Role of a Threat Analyst -- 1.9 Summary -- References -- Chapter 2 Defense against the Survivability to Network Strategies -- 2.1 Introduction -- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation -- 2.3 Single-Access Optical Network Ring Architecture
2.4 Multiaccess Optical Network Ring Architecture -- 2.5 Channel Demand Routing Ring Architecture -- 2.6 Result -- 2.7 Conclusion -- References -- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems -- 3.1 Introduction -- 3.2 Background Knowledge of CPS -- 3.3 Application Areas of Cyber-Physical System (CPS) -- 3.4 Philosophical Issues of CPS -- 3.5 Principle of CPS Operation -- 3.6 Architecture of CPS -- 3.6.1 Physical Layer -- 3.6.2 Data Link Layer -- 3.6.3 Network Layer -- 3.6.4 Transport Layer -- 3.6.5 Session Layer -- 3.6.6 Presentation Layer -- 3.6.7 Application Layer -- 3.7 Self-Adaptive Patterns -- 3.7.1 Synthesis Utilized Pattern -- 3.7.2 Synthesis Command Patterns -- 3.7.3 Collect Organized Patterns -- 3.8 Security Threats of CPS -- 3.9 Attacks on CPS -- 3.10 Attacks and Its Consequences -- 3.11 Adversaries' Characteristics -- 3.12 Conclusion -- References -- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks -- 4.1 Introduction -- 4.2 Related Works -- 4.3 System Model -- 4.4 Common Attacks in CR-WSN -- 4.4.1 Replay Attack -- 4.4.2 Node-Targeted Attack -- 4.4.3 Power Consumption Attack -- 4.4.4 Location Privacy -- 4.5 Performance Evaluation -- 4.5.1 Countermeasures in CR-WSN -- 4.6 Conclusion and Future Work -- References -- Chapter 5 Security Issues in IoT Networks -- 5.1 Introduction -- 5.2 Challenges for IoT Network -- 5.2.1 The Most Important Challenges in IoT Network -- 5.2.1.1 Schema Processing -- 5.2.1.2 Speed -- 5.2.1.3 The Value -- 5.2.1.4 The Security -- 5.3 Elements for the Internet of Things (IoT) -- 5.4 Cases and Scenarios for IoT Network -- 5.4.1 Clustering -- 5.4.2 Tracking -- 5.4.3 Tactical Networks and High Dynamic Network -- 5.5 The Vision of Internet of Things (IoT) -- 5.6 Software-Defined IoT -- 5.7 IoT Architecture -- 5.8 Algorithm for Internet of Things (IoT)
5.9 Business Context of the IoT -- 5.10 IoT Device Information Collection Process -- 5.11 Introduction to IoT Security -- 5.12 D evelopment of IoT Security Mechanisms -- 5.13 Security Attacks in IoT -- 5.14 IoT Security Challenges -- 5.14.1 IoT Security Risks and Challenges -- 5.14.2 IoT Security Requirements -- 5.15 Conclusion -- References -- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario -- 6.1 IoT Ecosystem History -- 6.2 IoT Ecosystem -- 6.2.1 Building an IoT Ecosystem -- 6.3 Challenges in Building an Ecosystem -- 6.4 IoT Ecosystem Implications -- 6.5 IoT Security Implications -- 6.6 Current IoT Security Scenario and Trends -- 6.6.1 Why These Are Not Enough -- 6.6.2 The Ideal Security System -- 6.7 A Solution-Blockchain Technology -- 6.7.1 Implementing Blockchain in an IoT Ecosystem -- 6.8 Conclusion -- References -- Chapter 7 Design Principles and Privacy in Cloud Computing -- 7.1 Introduction -- 7.1.1 Evolution of Cloud Computing -- 7.1.2 Applications of Cloud Computing in Various Domains -- 7.1.3 Generalized Architecture for Cloud Computing -- 7.1.4 Design Principles in Cloud Computing -- 7.1.5 Privacy Issues in Cloud Computing -- 7.1.6 Chapter Outline -- 7.2 Security Requirements and Attacks in Cloud Computing -- 7.2.1 Threat Model -- 7.2.2 Security Requirements in Cloud Computing -- 7.2.3 Security Attacks in Cloud Computing -- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing -- 7.3.1 Key Management -- 7.3.2 User Authentication/Device Authentication -- 7.3.3 Access Control/User Access Control -- 7.3.4 Intrusion Detection -- 7.3.5 Privacy Preservation -- 7.4 Challenges and Future Research Directions -- 7.4.1 Design of Lightweight Security Protocols -- 7.4.2 Securing Data Mining Methods -- 7.4.3 Granular Auditing -- 7.4.4 Blockchain-Based Decentralized Mechanisms -- 7.5 Conclusion
Bibliography -- Chapter 8 Big Data Analysis on Smart Tools and Techniques -- 8.1 Introduction -- 8.2 Big Data Challenges -- 8.3 Big Data Analysis Techniques and Tools -- 8.3.1 Data Mining -- 8.3.2 Web Mining -- 8.3.3 Visualization Methods -- 8.3.4 Machine Learning -- 8.3.5 Multilayer Perceptron (MLP) -- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs) -- 8.3.7 Support Vector Machine (SVM) -- 8.3.8 Optimization Methods -- 8.3.9 Stochastic Optimization -- 8.3.10 Deterministic Optimization -- 8.4 Related Work -- 8.5 Discussion and Conclusion -- 8.5.1 Discussion -- 8.5.2 Conclusion -- References -- Chapter 9 Lightweight Security Protocols for Blockchain Technology -- 9.1 Introduction -- 9.2 Blockchain Technology Design Space -- 9.3 Consensus -- 9.3.1 Distinct Features of Blockchain Distributed Architecture -- 9.4 Practical Applications of Blockchain -- 9.5 Advantages and Disadvantages of Blockchain -- 9.5.1 Advantages -- 9.5.2 Disadvantages -- 9.6 Limitations and Drawbacks of Blockchain -- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology -- 9.7.1 Comparison of Security and Functionality Features -- 9.7.2 Comparison of Communication Costs -- 9.7.3 Comparison of Computation Costs -- 9.8 Deployment and Implementation of Testbeds for Blockchain -- 9.9 Conclusion -- Acknowledgments -- Bibliography -- Chapter 10 Privacy and Challenges to Data-Intensive Techniques -- 10.1 Introduction -- 10.2 Advantages of Cybersecurity -- 10.3 Approach and Workflow -- 10.3.1 Common Steps in Cybersecurity -- 10.3.2 Set Up Your Risk Management Regime -- 10.4 Cybersecurity Principles and Goals -- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution -- 10.5.1 Confidentiality -- 10.5.1.1 Tools for Confidentiality -- 10.5.2 Integrity -- 10.5.2.1 Tools for Integrity -- 10.5.3 Availability -- 10.5.3.1 Tools of Availability
10.5.4 Challenges of Cybersecurity -- 10.5.5 Data Security Consideration -- 10.6 Privacy Preservation -- 10.6.1 Privacy in Cybersecurity -- 10.6.2 Data-Intensive Technology -- 10.7 Challenges in Data-Intensive Techniques -- 10.8 Cybersecurity to Data-Intensive Techniques -- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques -- 10.9 Conclusion -- References -- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine -- 11.1 Introduction -- 11.2 Related Works -- 11.3 Nomenclature -- 11.4 Formulation of Mathematical Model and Assumptions -- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R) -- 1 11.6 Basic Reproduction Number and Equilibrium -- 11.7 Existence and Stability Analysis -- 11.8 Conclusion -- References -- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method -- 12.1 Introduction -- 12.2 Purpose and Goal of the Research -- 12.3 Relationship between the AI/Human Players and the System -- 12.4 Game-Related Information -- 12.4.1 Game Rules -- 12.4.2 Character Information -- 12.5 Approach -- 12.5.1 Rule-Based Method Structure -- 12.5.2 Rule Analysis of the Fighting Game Player -- 12.5.3 Methodology -- 12.6 Experiment -- 12.6.1 Environment and Settings -- 12.6.2 Results and Discussions -- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player -- 12.7 C onclusion -- References -- Chapter 13 Web-Based Smart Agriculture System -- 13.1 Introduction -- 13.2 Major Factors of Smart Agriculture -- 13.2.1 Increase in Agriculture Productivity -- 13.2.2 Minimizing Agriculture Greenhouse Gases -- 13.3 Ancient Farming Technology and Machinery -- 13.3.1 Old Techniques -- 13.3.2 Old Machinery -- 13.4 Drawbacks of Old Techniques -- 13.5 Tools Used For Smart Agriculture
13.5.1 GPS Locator
Computer security
title Cyber defense mechanisms security, privacy, and challenges
title_auth Cyber defense mechanisms security, privacy, and challenges
title_exact_search Cyber defense mechanisms security, privacy, and challenges
title_full Cyber defense mechanisms security, privacy, and challenges edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong
title_fullStr Cyber defense mechanisms security, privacy, and challenges edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong
title_full_unstemmed Cyber defense mechanisms security, privacy, and challenges edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong
title_short Cyber defense mechanisms
title_sort cyber defense mechanisms security privacy and challenges
title_sub security, privacy, and challenges
topic Computer security
topic_facet Computer security
work_keys_str_mv AT kumargautam cyberdefensemechanismssecurityprivacyandchallenges
AT sainidineshkumar cyberdefensemechanismssecurityprivacyandchallenges
AT cuongnguyenhahuy cyberdefensemechanismssecurityprivacyandchallenges