Cyber defense mechanisms security, privacy, and challenges
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2021
|
Ausgabe: | First edition |
Schriftenreihe: | Artificial Intelligence (AI): Elementary to advanced practices
|
Schlagworte: | |
Online-Zugang: | TUM01 |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Inhaltsangabe:
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Table of Contents
- Preface
- Editors
- Contributors
- Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies
- 1.1 Introduction
- 1.2 History of Security Breaches
- 1.3 Common Security Threats
- 1.3.1 Malware
- 1.3.2 Phishing
- 1.3.3 Spear Phishing
- 1.3.4 "Man in the Middle" (MitM) Attack
- 1.3.5 Trojans
- 1.3.6 Ransomware
- 1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS)
- 1.3.8 Attacks on IoT Devices
- 1.3.9 Data Breaches
- 1.3.10 Malware on Mobile Apps
- 1.4 Security Challenges in Modern Day
- 1.4.1 Cloud Computing
- 1.4.2 Social Media
- 1.4.3 Smart Phones
- 1.4.4 General Data Protection Regulations (GDPR)
- 1.4.5 Attacks Based on Machine Learning and AI
- 1.4.6 Attacks against Cryptocurrencies and Blockchain Systems
- 1.4.7 Switching to DevOps
- 1.4.8 Biometric Authentication
- 1.4.9 Fileless Malware
- 1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT)
- 1.5.1 How an APT Attack Works
- 1.5.2 Some Instances of APTs
- 1.5.3 Characteristics of APTs
- 1.6 Prevention Measures
- 1.6.1 Identify the Threats
- 1.6.2 Beware of Cybercrimes
- 1.6.3 Observe All Stakeholders
- 1.6.4 Usage of Two-Factor Authentication
- 1.6.5 Conduct Regular Audits
- 1.6.6 Draft a Credit Sign-Off Policy
- 1.6.7 Protect Vital Data
- 1.6.8 Perform Risk Assessments
- 1.6.9 Insure against Cybercrime
- 1.6.10 Gather In-Depth Knowledge about Risk Factors
- 1.7 Threat Modeling
- 1.8 Role of a Threat Analyst
- 1.9 Summary
- References
- Chapter 2 Defense against the Survivability to Network Strategies
- 2.1 Introduction
- 2.2 Survivability Network Architecture-SONET and Self-Healing Ring Transportation
- 2.3 Single-Access Optical Network Ring Architecture
- 2.4 Multiaccess Optical Network Ring Architecture
- 2.5 Channel Demand Routing Ring Architecture
- 2.6 Result
- 2.7 Conclusion
- References
- Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems
- 3.1 Introduction
- 3.2 Background Knowledge of CPS
- 3.3 Application Areas of Cyber-Physical System (CPS)
- 3.4 Philosophical Issues of CPS
- 3.5 Principle of CPS Operation
- 3.6 Architecture of CPS
- 3.6.1 Physical Layer
- 3.6.2 Data Link Layer
- 3.6.3 Network Layer
- 3.6.4 Transport Layer
- 3.6.5 Session Layer
- 3.6.6 Presentation Layer
- 3.6.7 Application Layer
- 3.7 Self-Adaptive Patterns
- 3.7.1 Synthesis Utilized Pattern
- 3.7.2 Synthesis Command Patterns
- 3.7.3 Collect Organized Patterns
- 3.8 Security Threats of CPS
- 3.9 Attacks on CPS
- 3.10 Attacks and Its Consequences
- 3.11 Adversaries' Characteristics
- 3.12 Conclusion
- References
- Chapter 4 Secure Channel Allocation in Cognitive Radio-Wireless Sensor Networks
- 4.1 Introduction
- 4.2 Related Works
- 4.3 System Model
- 4.4 Common Attacks in CR-WSN
- 4.4.1 Replay Attack
- 4.4.2 Node-Targeted Attack
- 4.4.3 Power Consumption Attack
- 4.4.4 Location Privacy
- 4.5 Performance Evaluation
- 4.5.1 Countermeasures in CR-WSN
- 4.6 Conclusion and Future Work
- References
- Chapter 5 Security Issues in IoT Networks
- 5.1 Introduction
- 5.2 Challenges for IoT Network
- 5.2.1 The Most Important Challenges in IoT Network
- 5.2.1.1 Schema Processing
- 5.2.1.2 Speed
- 5.2.1.3 The Value
- 5.2.1.4 The Security
- 5.3 Elements for the Internet of Things (IoT)
- 5.4 Cases and Scenarios for IoT Network
- 5.4.1 Clustering
- 5.4.2 Tracking
- 5.4.3 Tactical Networks and High Dynamic Network
- 5.5 The Vision of Internet of Things (IoT)
- 5.6 Software-Defined IoT
- 5.7 IoT Architecture
- 5.8 Algorithm for Internet of Things (IoT)
- 5.9 Business Context of the IoT
- 5.10 IoT Device Information Collection Process
- 5.11 Introduction to IoT Security
- 5.12 D evelopment of IoT Security Mechanisms
- 5.13 Security Attacks in IoT
- 5.14 IoT Security Challenges
- 5.14.1 IoT Security Risks and Challenges
- 5.14.2 IoT Security Requirements
- 5.15 Conclusion
- References
- Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
- 6.1 IoT Ecosystem History
- 6.2 IoT Ecosystem
- 6.2.1 Building an IoT Ecosystem
- 6.3 Challenges in Building an Ecosystem
- 6.4 IoT Ecosystem Implications
- 6.5 IoT Security Implications
- 6.6 Current IoT Security Scenario and Trends
- 6.6.1 Why These Are Not Enough
- 6.6.2 The Ideal Security System
- 6.7 A Solution-Blockchain Technology
- 6.7.1 Implementing Blockchain in an IoT Ecosystem
- 6.8 Conclusion
- References
- Chapter 7 Design Principles and Privacy in Cloud Computing
- 7.1 Introduction
- 7.1.1 Evolution of Cloud Computing
- 7.1.2 Applications of Cloud Computing in Various Domains
- 7.1.3 Generalized Architecture for Cloud Computing
- 7.1.4 Design Principles in Cloud Computing
- 7.1.5 Privacy Issues in Cloud Computing
- 7.1.6 Chapter Outline
- 7.2 Security Requirements and Attacks in Cloud Computing
- 7.2.1 Threat Model
- 7.2.2 Security Requirements in Cloud Computing
- 7.2.3 Security Attacks in Cloud Computing
- 7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing
- 7.3.1 Key Management
- 7.3.2 User Authentication/Device Authentication
- 7.3.3 Access Control/User Access Control
- 7.3.4 Intrusion Detection
- 7.3.5 Privacy Preservation
- 7.4 Challenges and Future Research Directions
- 7.4.1 Design of Lightweight Security Protocols
- 7.4.2 Securing Data Mining Methods
- 7.4.3 Granular Auditing
- 7.4.4 Blockchain-Based Decentralized Mechanisms
- 7.5 Conclusion
- Bibliography
- Chapter 8 Big Data Analysis on Smart Tools and Techniques
- 8.1 Introduction
- 8.2 Big Data Challenges
- 8.3 Big Data Analysis Techniques and Tools
- 8.3.1 Data Mining
- 8.3.2 Web Mining
- 8.3.3 Visualization Methods
- 8.3.4 Machine Learning
- 8.3.5 Multilayer Perceptron (MLP)
- 8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs)
- 8.3.7 Support Vector Machine (SVM)
- 8.3.8 Optimization Methods
- 8.3.9 Stochastic Optimization
- 8.3.10 Deterministic Optimization
- 8.4 Related Work
- 8.5 Discussion and Conclusion
- 8.5.1 Discussion
- 8.5.2 Conclusion
- References
- Chapter 9 Lightweight Security Protocols for Blockchain Technology
- 9.1 Introduction
- 9.2 Blockchain Technology Design Space
- 9.3 Consensus
- 9.3.1 Distinct Features of Blockchain Distributed Architecture
- 9.4 Practical Applications of Blockchain
- 9.5 Advantages and Disadvantages of Blockchain
- 9.5.1 Advantages
- 9.5.2 Disadvantages
- 9.6 Limitations and Drawbacks of Blockchain
- 9.7 Comparative Study on Authentication Protocols for Blockchain Technology
- 9.7.1 Comparison of Security and Functionality Features
- 9.7.2 Comparison of Communication Costs
- 9.7.3 Comparison of Computation Costs
- 9.8 Deployment and Implementation of Testbeds for Blockchain
- 9.9 Conclusion
- Acknowledgments
- Bibliography
- Chapter 10 Privacy and Challenges to Data-Intensive Techniques
- 10.1 Introduction
- 10.2 Advantages of Cybersecurity
- 10.3 Approach and Workflow
- 10.3.1 Common Steps in Cybersecurity
- 10.3.2 Set Up Your Risk Management Regime
- 10.4 Cybersecurity Principles and Goals
- 10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution
- 10.5.1 Confidentiality
- 10.5.1.1 Tools for Confidentiality
- 10.5.2 Integrity
- 10.5.2.1 Tools for Integrity
- 10.5.3 Availability
- 10.5.3.1 Tools of Availability
- 10.5.4 Challenges of Cybersecurity
- 10.5.5 Data Security Consideration
- 10.6 Privacy Preservation
- 10.6.1 Privacy in Cybersecurity
- 10.6.2 Data-Intensive Technology
- 10.7 Challenges in Data-Intensive Techniques
- 10.8 Cybersecurity to Data-Intensive Techniques
- 10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques
- 10.9 Conclusion
- References
- Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine
- 11.1 Introduction
- 11.2 Related Works
- 11.3 Nomenclature
- 11.4 Formulation of Mathematical Model and Assumptions
- 11.5 Mathematical Model (S, Q, I, Q[sub(1)], R)
- 1 11.6 Basic Reproduction Number and Equilibrium
- 11.7 Existence and Stability Analysis
- 11.8 Conclusion
- References
- Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method
- 12.1 Introduction
- 12.2 Purpose and Goal of the Research
- 12.3 Relationship between the AI/Human Players and the System
- 12.4 Game-Related Information
- 12.4.1 Game Rules
- 12.4.2 Character Information
- 12.5 Approach
- 12.5.1 Rule-Based Method Structure
- 12.5.2 Rule Analysis of the Fighting Game Player
- 12.5.3 Methodology
- 12.6 Experiment
- 12.6.1 Environment and Settings
- 12.6.2 Results and Discussions
- 12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player
- 12.7 C onclusion
- References
- Chapter 13 Web-Based Smart Agriculture System
- 13.1 Introduction
- 13.2 Major Factors of Smart Agriculture
- 13.2.1 Increase in Agriculture Productivity
- 13.2.2 Minimizing Agriculture Greenhouse Gases
- 13.3 Ancient Farming Technology and Machinery
- 13.3.1 Old Techniques
- 13.3.2 Old Machinery
- 13.4 Drawbacks of Old Techniques
- 13.5 Tools Used For Smart Agriculture
- 13.5.1 GPS Locator