Information Fusion for Cyber-Security Analytics
โ Scribed by Izzat M Alsmadi, George Karabatis, Ahmed Aleroud (eds.)
- Publisher
- Springer International Publishing
- Year
- 2017
- Tongue
- English
- Leaves
- 379
- Series
- Studies in Computational Intelligence 691
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.
โฆ Table of Contents
Front Matter....Pages i-x
Using Contextual Information to Identify Cyber-Attacks....Pages 1-16
A Framework for Contextual Information Fusion to Detect Cyber-Attacks....Pages 17-51
Detecting Unknown Attacks Using Context Similarity....Pages 53-75
Unwanted Traffic Detection and Control Based on Trust Management....Pages 77-109
Characterization of Evolving Networks for Cybersecurity....Pages 111-127
Cybercrime: Concerns, Challenges and Opportunities....Pages 129-153
Intrusion Prediction Systems....Pages 155-174
Analytics for Network Security: A Survey and Taxonomy....Pages 175-193
Security in Wireless Sensor Networks (WSNs) and Their Applications....Pages 195-228
Emerging Trends in Security System Design Using the Concept of Social Behavioural Biometrics....Pages 229-251
Empirical Evidences in Software-Defined Network Security: A Systematic Literature Review....Pages 253-295
SDN-Based Real-Time IDS/IPS Alerting System....Pages 297-306
Digital Forensics: Implementation and Analysis for Google Android Framework....Pages 307-331
A Systematic Literature Review on Software-Defined Networking....Pages 333-369
Back Matter....Pages 371-379
โฆ Subjects
Communications Engineering, Networks;Circuits and Systems;Systems and Data Security;Big Data/Analytics
๐ SIMILAR VOLUMES
<span>The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals included under its terms; ultimately the priv
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyz
<p><span>This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) de