<p>This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. </p> <p>The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks
Cyber defense mechanisms security, privacy, and challenges
β Scribed by Kumar, Gautam(Editor);Saini, Dinesh Kumar(Editor);Cuong, Nguyen Ha Huy(Editor)
- Publisher
- CRC Press
- Year
- 2020;2021
- Tongue
- English
- Leaves
- 231
- Series
- Artificial intelligence (AI). Elementary to advanced practices
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.γγγγ
The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use.γγγγ
Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.
β¦ Table of Contents
Cover......Page 1
Half Title......Page 2
Series Page......Page 3
Title Page......Page 4
Copyright Page......Page 5
Table of Contents......Page 6
Preface......Page 8
Editors......Page 10
Contributors......Page 12
Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies......Page 16
1.1 Introduction......Page 17
1.2 History of Security Breaches......Page 18
1.3.1 Malware......Page 19
1.3.5 Trojans......Page 20
1.3.10 Malware on Mobile Apps......Page 21
1.4.1 Cloud Computing......Page 22
1.4.3 Smart Phones......Page 23
1.4.5 Attacks Based on Machine Learning and AI......Page 24
1.4.7 Switching to DevOps......Page 25
1.4.9 Fileless Malware......Page 26
1.5.1 How an APT Attack Works......Page 27
1.5.2 Some Instances of APTs......Page 28
1.5.3 Characteristics of APTs......Page 29
1.6.4 Usage of Two-Factor Authentication......Page 30
1.6.9 Insure against Cybercrime......Page 31
1.6.10 Gather In-Depth Knowledge about Risk Factors......Page 32
1.7 Threat Modeling......Page 33
1.8 Role of a Threat Analyst......Page 35
1.9 Summary......Page 36
References......Page 37
2.1 Introduction......Page 38
2.3 Single-Access Optical Network Ring Architecture......Page 39
2.4 Multiaccess Optical Network Ring Architecture......Page 40
2.5 Channel Demand Routing Ring Architecture......Page 41
2.6 Result......Page 44
References......Page 46
Chapter 3 Defense Mechanism toΒ Self-Adaptive Cyber-Physical Security Systems......Page 48
3.1 Introduction......Page 49
3.3 Application Areas of Cyber-Physical System (CPS)......Page 50
3.5 Principle of CPS Operation......Page 51
3.6.3 Network Layer......Page 52
3.7.1 Synthesis Utilized Pattern......Page 53
3.7.2 Synthesis Command Patterns......Page 54
3.8 Security Threats of CPS......Page 55
3.9 Attacks on CPS......Page 56
3.10 Attacks and Its Consequences......Page 57
3.11 Adversariesβ Characteristics......Page 58
References......Page 59
4.1 Introduction......Page 62
4.2 Related Works......Page 64
4.3 System Model......Page 65
4.4.2 Node-Targeted Attack......Page 69
4.5 Performance Evaluation......Page 70
4.5.1 Countermeasures in CR-WSN......Page 74
References......Page 76
5.1 Introduction......Page 78
5.2.1.3 The Value......Page 79
5.4.3 Tactical Networks and High Dynamic Network......Page 80
5.7 IoT Architecture......Page 81
5.10 IoT Device Information Collection Process......Page 82
5.12 D evelopment of IoT Security Mechanisms......Page 83
5.14.1 IoT Security Risks and Challenges......Page 85
5.14.2 IoT Security Requirements......Page 86
References......Page 87
6.1 IoT Ecosystem History......Page 90
6.2.1 Building an IoT Ecosystem......Page 91
6.4 IoT Ecosystem Implications......Page 92
6.6 Current IoT Security Scenario and Trends......Page 93
6.7 A SolutionβBlockchain Technology......Page 95
References......Page 97
Chapter 7 Design Principles and Privacy in Cloud Computing......Page 100
7.1 Introduction......Page 101
7.1.1 Evolution of Cloud Computing......Page 102
7.1.2 Applications of Cloud Computing in Various Domains......Page 103
7.1.3 Generalized Architecture for Cloud Computing......Page 105
7.1.4 Design Principles in Cloud Computing......Page 106
7.1.6 Chapter Outline......Page 108
7.2.2 Security Requirements in Cloud Computing......Page 109
7.2.3 Security Attacks in Cloud Computing......Page 110
7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing......Page 111
7.3.1 Key Management......Page 112
7.3.2 User Authentication/Device Authentication......Page 113
7.3.3 Access Control/User Access Control......Page 116
7.3.4 Intrusion Detection......Page 117
7.3.5 Privacy Preservation......Page 118
7.4.1 Design of Lightweight Security Protocols......Page 119
7.4.3 Granular Auditing......Page 120
Bibliography......Page 121
8.1 Introduction......Page 126
8.2 Big Data Challenges......Page 129
8.3.1 Data Mining......Page 130
8.3.2 Web Mining......Page 131
8.3.3 Visualization Methods......Page 132
8.3.4 Machine Learning......Page 133
8.3.5 Multilayer Perceptron (MLP)......Page 134
8.3.7 Support Vector Machine (SVM)......Page 135
8.3.9 Stochastic Optimization......Page 136
8.3.10 Deterministic Optimization......Page 137
8.4 Related Work......Page 138
8.5.1 Discussion......Page 140
8.5.2 Conclusion......Page 142
References......Page 143
9.1 Introduction......Page 146
9.2 Blockchain Technology Design Space......Page 149
9.3 Consensus......Page 151
9.3.1 Distinct Features of Blockchain Distributed Architecture......Page 153
9.4 Practical Applications of Blockchain......Page 154
9.5 Advantages and Disadvantages of Blockchain......Page 160
9.6 Limitations and Drawbacks of Blockchain......Page 161
9.7 Comparative Study on Authentication Protocols for Blockchain Technology......Page 162
9.7.1 Comparison of Security and Functionality Features......Page 163
9.7.2 Comparison of Communication Costs......Page 165
9.8 Deployment and Implementation of Testbeds for Blockchain......Page 166
9.9 Conclusion......Page 167
Bibliography......Page 168
Chapter 10 Privacy and Challenges to Data-Intensive Techniques......Page 172
10.3 Approach and Workflow......Page 173
10.3.2 Set Up Your Risk Management Regime......Page 175
10.4 Cybersecurity Principles and Goals......Page 176
10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution......Page 177
10.5.1.1 Tools for Confidentiality......Page 178
10.5.3.1 Tools of Availability......Page 179
10.6 Privacy Preservation......Page 180
10.6.2 Data-Intensive Technology......Page 181
10.8 Cybersecurity to Data-Intensive Techniques......Page 182
10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques......Page 183
References......Page 184
11.1 Introduction......Page 186
11.2 Related Works......Page 187
11.4 Formulation of Mathematical Model and Assumptions......Page 189
11.5 Mathematical Model (S, Q, I, Q[sub(1)], R)......Page 190
11.7 Existence and Stability Analysis......Page 191
11.8 Conclusion......Page 196
References......Page 197
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method......Page 200
12.1 Introduction......Page 201
12.4.1 Game Rules......Page 203
12.5.2 Rule Analysis of the Fighting Game Player......Page 204
12.5.3 Methodology......Page 205
12.6.2 Results and Discussions......Page 206
12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player......Page 209
References......Page 210
Chapter 13 Web-Based Smart Agriculture System......Page 212
13.2.1 Increase in Agriculture Productivity......Page 213
13.2.2 Minimizing Agriculture Greenhouse Gases......Page 214
13.3.1 Old Techniques......Page 216
13.4 Drawbacks of Old Techniques......Page 217
13.5.2 Sensors......Page 218
13.5.5 Drones......Page 219
13.6 New Methods Used For Smart Agriculture......Page 221
13.8 Smart Technology Used For Farming......Page 222
13.8.3 Robots......Page 223
13.9 Security Challenges......Page 224
References......Page 225
Index......Page 228
π SIMILAR VOLUMES
<p>Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress,
<span>Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber world. New technologies ar