Cyber defense mechanisms security, privacy, and challenges

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Kumar, Gautam (HerausgeberIn), Saini, Dinesh Kumar (HerausgeberIn), Cuong, Nguyen Ha Huy (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Boca Raton ; London ; New York CRC Press 2021
Ausgabe:First edition
Schriftenreihe:Artificial Intelligence (AI): Elementary to advanced practices
Schlagworte:
Online-Zugang:TUM01
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Inhaltsangabe:
  • Cover
  • Half Title
  • Series Page
  • Title Page
  • Copyright Page
  • Table of Contents
  • Preface
  • Editors
  • Contributors
  • Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies
  • 1.1 Introduction
  • 1.2 History of Security Breaches
  • 1.3 Common Security Threats
  • 1.3.1 Malware
  • 1.3.2 Phishing
  • 1.3.3 Spear Phishing
  • 1.3.4 "Man in the Middle" (MitM) Attack
  • 1.3.5 Trojans
  • 1.3.6 Ransomware
  • 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS)
  • 1.3.8 Attacks on IoT Devices
  • 1.3.9 Data Breaches
  • 1.3.10 Malware on Mobile Apps
  • 1.4 Security Challenges in Modern Day
  • 1.4.1 Cloud Computing
  • 1.4.2 Social Media
  • 1.4.3 Smart Phones
  • 1.4.4 General Data Protection Regulations (GDPR)
  • 1.4.5 Attacks Based on Machine Learning and AI
  • 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems
  • 1.4.7 Switching to DevOps
  • 1.4.8 Biometric Authentication
  • 1.4.9 Fileless Malware
  • 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT)
  • 1.5.1 How an APT Attack Works
  • 1.5.2 Some Instances of APTs
  • 1.5.3 Characteristics of APTs
  • 1.6 Prevention Measures
  • 1.6.1 Identify the Threats
  • 1.6.2 Beware of Cybercrimes
  • 1.6.3 Observe All Stakeholders
  • 1.6.4 Usage of Two-Factor Authentication
  • 1.6.5 Conduct Regular Audits
  • 1.6.6 Draft a Credit Sign-Off Policy
  • 1.6.7 Protect Vital Data
  • 1.6.8 Perform Risk Assessments
  • 1.6.9 Insure against Cybercrime
  • 1.6.10 Gather In-Depth Knowledge about Risk Factors
  • 1.7 Threat Modeling
  • 1.8 Role of a Threat Analyst
  • 1.9 Summary
  • References
  • Chapter 2 Defense against the Survivability to Network Strategies
  • 2.1 Introduction
  • 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation
  • 2.3 Single-Access Optical Network Ring Architecture
  • 2.4 Multiaccess Optical Network Ring Architecture
  • 2.5 Channel Demand Routing Ring Architecture
  • 2.6 Result
  • 2.7 Conclusion
  • References
  • Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems
  • 3.1 Introduction
  • 3.2 Background Knowledge of CPS
  • 3.3 Application Areas of Cyber-Physical System (CPS)
  • 3.4 Philosophical Issues of CPS
  • 3.5 Principle of CPS Operation
  • 3.6 Architecture of CPS
  • 3.6.1 Physical Layer
  • 3.6.2 Data Link Layer
  • 3.6.3 Network Layer
  • 3.6.4 Transport Layer
  • 3.6.5 Session Layer
  • 3.6.6 Presentation Layer
  • 3.6.7 Application Layer
  • 3.7 Self-Adaptive Patterns
  • 3.7.1 Synthesis Utilized Pattern
  • 3.7.2 Synthesis Command Patterns
  • 3.7.3 Collect Organized Patterns
  • 3.8 Security Threats of CPS
  • 3.9 Attacks on CPS
  • 3.10 Attacks and Its Consequences
  • 3.11 Adversaries' Characteristics
  • 3.12 Conclusion
  • References
  • Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks
  • 4.1 Introduction
  • 4.2 Related Works
  • 4.3 System Model
  • 4.4 Common Attacks in CR-WSN
  • 4.4.1 Replay Attack
  • 4.4.2 Node-Targeted Attack
  • 4.4.3 Power Consumption Attack
  • 4.4.4 Location Privacy
  • 4.5 Performance Evaluation
  • 4.5.1 Countermeasures in CR-WSN
  • 4.6 Conclusion and Future Work
  • References
  • Chapter 5 Security Issues in IoT Networks
  • 5.1 Introduction
  • 5.2 Challenges for IoT Network
  • 5.2.1 The Most Important Challenges in IoT Network
  • 5.2.1.1 Schema Processing
  • 5.2.1.2 Speed
  • 5.2.1.3 The Value
  • 5.2.1.4 The Security
  • 5.3 Elements for the Internet of Things (IoT)
  • 5.4 Cases and Scenarios for IoT Network
  • 5.4.1 Clustering
  • 5.4.2 Tracking
  • 5.4.3 Tactical Networks and High Dynamic Network
  • 5.5 The Vision of Internet of Things (IoT)
  • 5.6 Software-Defined IoT
  • 5.7 IoT Architecture
  • 5.8 Algorithm for Internet of Things (IoT)
  • 5.9 Business Context of the IoT
  • 5.10 IoT Device Information Collection Process
  • 5.11 Introduction to IoT Security
  • 5.12 D evelopment of IoT Security Mechanisms
  • 5.13 Security Attacks in IoT
  • 5.14 IoT Security Challenges
  • 5.14.1 IoT Security Risks and Challenges
  • 5.14.2 IoT Security Requirements
  • 5.15 Conclusion
  • References
  • Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
  • 6.1 IoT Ecosystem History
  • 6.2 IoT Ecosystem
  • 6.2.1 Building an IoT Ecosystem
  • 6.3 Challenges in Building an Ecosystem
  • 6.4 IoT Ecosystem Implications
  • 6.5 IoT Security Implications
  • 6.6 Current IoT Security Scenario and Trends
  • 6.6.1 Why These Are Not Enough
  • 6.6.2 The Ideal Security System
  • 6.7 A Solution-Blockchain Technology
  • 6.7.1 Implementing Blockchain in an IoT Ecosystem
  • 6.8 Conclusion
  • References
  • Chapter 7 Design Principles and Privacy in Cloud Computing
  • 7.1 Introduction
  • 7.1.1 Evolution of Cloud Computing
  • 7.1.2 Applications of Cloud Computing in Various Domains
  • 7.1.3 Generalized Architecture for Cloud Computing
  • 7.1.4 Design Principles in Cloud Computing
  • 7.1.5 Privacy Issues in Cloud Computing
  • 7.1.6 Chapter Outline
  • 7.2 Security Requirements and Attacks in Cloud Computing
  • 7.2.1 Threat Model
  • 7.2.2 Security Requirements in Cloud Computing
  • 7.2.3 Security Attacks in Cloud Computing
  • 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing
  • 7.3.1 Key Management
  • 7.3.2 User Authentication/Device Authentication
  • 7.3.3 Access Control/User Access Control
  • 7.3.4 Intrusion Detection
  • 7.3.5 Privacy Preservation
  • 7.4 Challenges and Future Research Directions
  • 7.4.1 Design of Lightweight Security Protocols
  • 7.4.2 Securing Data Mining Methods
  • 7.4.3 Granular Auditing
  • 7.4.4 Blockchain-Based Decentralized Mechanisms
  • 7.5 Conclusion
  • Bibliography
  • Chapter 8 Big Data Analysis on Smart Tools and Techniques
  • 8.1 Introduction
  • 8.2 Big Data Challenges
  • 8.3 Big Data Analysis Techniques and Tools
  • 8.3.1 Data Mining
  • 8.3.2 Web Mining
  • 8.3.3 Visualization Methods
  • 8.3.4 Machine Learning
  • 8.3.5 Multilayer Perceptron (MLP)
  • 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs)
  • 8.3.7 Support Vector Machine (SVM)
  • 8.3.8 Optimization Methods
  • 8.3.9 Stochastic Optimization
  • 8.3.10 Deterministic Optimization
  • 8.4 Related Work
  • 8.5 Discussion and Conclusion
  • 8.5.1 Discussion
  • 8.5.2 Conclusion
  • References
  • Chapter 9 Lightweight Security Protocols for Blockchain Technology
  • 9.1 Introduction
  • 9.2 Blockchain Technology Design Space
  • 9.3 Consensus
  • 9.3.1 Distinct Features of Blockchain Distributed Architecture
  • 9.4 Practical Applications of Blockchain
  • 9.5 Advantages and Disadvantages of Blockchain
  • 9.5.1 Advantages
  • 9.5.2 Disadvantages
  • 9.6 Limitations and Drawbacks of Blockchain
  • 9.7 Comparative Study on Authentication Protocols for Blockchain Technology
  • 9.7.1 Comparison of Security and Functionality Features
  • 9.7.2 Comparison of Communication Costs
  • 9.7.3 Comparison of Computation Costs
  • 9.8 Deployment and Implementation of Testbeds for Blockchain
  • 9.9 Conclusion
  • Acknowledgments
  • Bibliography
  • Chapter 10 Privacy and Challenges to Data-Intensive Techniques
  • 10.1 Introduction
  • 10.2 Advantages of Cybersecurity
  • 10.3 Approach and Workflow
  • 10.3.1 Common Steps in Cybersecurity
  • 10.3.2 Set Up Your Risk Management Regime
  • 10.4 Cybersecurity Principles and Goals
  • 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution
  • 10.5.1 Confidentiality
  • 10.5.1.1 Tools for Confidentiality
  • 10.5.2 Integrity
  • 10.5.2.1 Tools for Integrity
  • 10.5.3 Availability
  • 10.5.3.1 Tools of Availability
  • 10.5.4 Challenges of Cybersecurity
  • 10.5.5 Data Security Consideration
  • 10.6 Privacy Preservation
  • 10.6.1 Privacy in Cybersecurity
  • 10.6.2 Data-Intensive Technology
  • 10.7 Challenges in Data-Intensive Techniques
  • 10.8 Cybersecurity to Data-Intensive Techniques
  • 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques
  • 10.9 Conclusion
  • References
  • Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine
  • 11.1 Introduction
  • 11.2 Related Works
  • 11.3 Nomenclature
  • 11.4 Formulation of Mathematical Model and Assumptions
  • 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R)
  • 1 11.6 Basic Reproduction Number and Equilibrium
  • 11.7 Existence and Stability Analysis
  • 11.8 Conclusion
  • References
  • Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method
  • 12.1 Introduction
  • 12.2 Purpose and Goal of the Research
  • 12.3 Relationship between the AI/Human Players and the System
  • 12.4 Game-Related Information
  • 12.4.1 Game Rules
  • 12.4.2 Character Information
  • 12.5 Approach
  • 12.5.1 Rule-Based Method Structure
  • 12.5.2 Rule Analysis of the Fighting Game Player
  • 12.5.3 Methodology
  • 12.6 Experiment
  • 12.6.1 Environment and Settings
  • 12.6.2 Results and Discussions
  • 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player
  • 12.7 C onclusion
  • References
  • Chapter 13 Web-Based Smart Agriculture System
  • 13.1 Introduction
  • 13.2 Major Factors of Smart Agriculture
  • 13.2.1 Increase in Agriculture Productivity
  • 13.2.2 Minimizing Agriculture Greenhouse Gases
  • 13.3 Ancient Farming Technology and Machinery
  • 13.3.1 Old Techniques
  • 13.3.2 Old Machinery
  • 13.4 Drawbacks of Old Techniques
  • 13.5 Tools Used For Smart Agriculture
  • 13.5.1 GPS Locator