𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security Analytics: A Data Centric Approach to Information Security

✍ Scribed by Mehak Khurana, Shilpa Mahajan


Publisher
CRC Press/Chapman & Hall
Year
2022
Tongue
English
Leaves
236
Series
Chapman & Hall/CRC Cyber-Physical Systems
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data.

Features

    • Helps to develop an understanding of how to acquire, prepare, visualize security data.

    • Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons.

    • Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area.

    • Designs analytical models to help detect malicious behaviour.

    The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.

    ✦ Table of Contents


    Cover
    Half Title
    Series Page
    Title Page
    Copyright Page
    Table of Contents
    Preface
    Editors
    Contributors
    Chapter 1: A Reliable Blockchain Application for Music in a Decentralized Network
    1.1 Introduction
    1.1.1 Need of Change in Music Industry
    1.1.2 Challenges Faced by the Music Industry
    1.2 Introduction to Blockchain
    1.3 Blockchain Technologies
    1.3.1 Smart Contracts
    1.3.2 Ethereum
    1.4 Framework for Royalty Distribution Using Blockchain
    1.5 Implementation and Results
    1.6 Future Research Prospects
    1.6.1 Universal Music Database
    1.6.2 Digital Content Distribution and Licensing
    1.6.3 Affordable Music Sampling
    1.7 Drawbacks
    1.8 Conclusion
    References
    Chapter 2: An Authentic Data-Centric Application for Medical Stores
    2.1 Introduction
    2.1.1 Purpose
    2.1.2 Intended Audience
    2.1.3 Product Scope
    2.1.4 Tech Stack Description
    2.1.5 Existing System
    2.2 Literature Survey
    2.3 Proposed Methodology for a Data-Centric Approach in Medical Stores
    2.3.1 Implementation of Intelligent Pharmacy Application
    2.3.2 Results and Discussion
    2.4 Conclusion
    References
    Chapter 3: Intelligent Data-Analytic Approach for Restaurant Recommendation
    3.1 Introduction to Machine Learning
    3.2 Related Work
    3.2.1 Exploring Venue Popularity
    3.2.2 Software Fault Prediction
    3.2.3 Temperature and Humidity Data Analysis
    3.2.4 Educational Data Mining for Prediction of Student Performance
    3.2.5 Crime Prediction and Forecasting
    3.2.6 Ship Trajectory Prediction
    3.2.7 Incident Analysis and Prediction
    3.2.8 Cross-Validation of Protein Structural Class Prediction
    3.3 Research Methodology – from Collecting Data to Suggesting Places
    3.3.1 Data Sources (Our Data Points)
    3.3.2 Analysis of the Venues Retrieved (Formatting and Cleaning)
    3.3.3 Some Venues Have Been Replaced with New Venues
    3.3.4 Clustering – Finding Similar Places
    3.3.5 K-Means Clustering – the Hot Approach
    3.4 Result and Analysis
    3.4.1 Categories – Types of Restaurants
    3.4.2 Average Rating for the Places
    3.4.3 Average Price Per Person of Venues
    3.5 Conclusion
    References
    Chapter 4: Investigation on Mobile Forensics Tools to Decode Cyber Crime
    4.1 Introduction to Mobile Forensics: Process and Methodology
    4.2 Preservation of Evidences in Mobile Device
    4.3 Acquisition from Mobile Device
    4.4 Examination and Analysis: Tools and Techniques
    4.5 SIM Forensics and Reporting of Evidences
    4.6 Conclusion
    References
    Chapter 5: Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications
    5.1 Introduction
    5.2 Microstrip Patch Antennas
    5.3 Electromagnetic Bandgap Structure
    5.4 Metamaterial Structure
    5.5 Multiple Input and Multiple Output (MIMO) Systems
    5.6 Techniques of Microstrip Patch Antennas
    5.7 Advantages and Disadvantages
    5.8 Applications
    5.9 Tools of Microstrip Patch Antenna
    5.10 Parameters of Microstrip Patch Antenna
    5.11 Conclusion
    References
    Chapter 6: Optical Encryption of Images Using Partial Pivoting Lower Upper Decomposition Based on Two Structured Deterministic Phase Masks in the Hybrid Transform Domain
    6.1 Introduction
    6.2 Theoretical Background
    6.2.1 Discrete Cosine Transform
    6.2.2 Fractional Fourier Transform
    6.2.3 Structured Deterministic Phase Mask
    6.3 Proposed Cryptosystem
    6.4 Simulation and Evaluation
    6.4.1 Statistical Analysis
    6.4.2 Attack Analysis
    6.4.3 NPCR and UACI Analysis
    6.4.4 Key Sensitivity Analysis
    6.5 Performance Comparison
    6.6 Conclusion
    References
    Chapter 7: A Comparative Analysis of Blockchain Integrated IoT Applications
    7.1 Introduction
    7.2 Introduction to Internet of Things
    7.2.1 IoT Architecture
    7.2.2 Challenges in IoT
    7.3 Introduction to Blockchain
    7.3.1 Important Features of Blockchain
    7.3.2 Types of Blockchain Models
    7.3.3 Blockchain Benefits
    7.3.4 Technology for Secure Blockchain Architecture
    7.4 Integration of Blockchain and IoT
    7.4.1 Advantages of Using Blockchain IoT
    7.5 Analysis of Various IoT Applications with Blockchain
    7.5.1 Supply Chain
    7.5.2 Ride Hiring System
    7.5.3 Solar Energy
    7.5.4 Printing Machine
    7.5.5 Home Space
    7.5.6 Waste Management
    7.5.7 Agriculture System
    7.5.8 Healthcare System
    7.5.9 Miscellaneous Applications
    7.5.10 Application Implementation
    7.5.11 Analysis of Blockchain Integrated IoT Applications
    7.6 Conclusion and Summary
    References
    Chapter 8: Blockchain: A New Power-Driven Technology for Smart Cities
    8.1 Introduction: Background and Driving Forces
    8.2 Solar Energy Smart Grid Powered with Blockchain
    8.3 Feedback and Opinion Gathering with Blockchain
    8.4 Conducting Elections and Referendums
    8.5 Citizen Rating Based on Environmental Awareness
    8.6 Secure Storage of Private and Sensitive Data of Citizens
    8.7 Generating New Streams of Income for Local Administrative and Municipal Bodies
    8.8 Blockchain-Based Universal Identification
    8.9 Education
    8.10 Healthcare
    8.11 Parking Management
    8.12 Resource Management
    8.13 Resource Management
    8.14 Limitation of Blockchain
    8.15 Conclusion
    References
    Chapter 9: Mutual Surf-Scaling Factor Features Analysis for Detecting DDoS Attacks Based on LatticeΒ Behavioral Using Spread Spectral Soft-Max-Recurrent Neural Networks
    9.1 Introduction
    9.2 Related Work
    9.3 Mutual Surf-Scaling Factor Features Analysis for Detecting DDoS Attacks
    9.3.1 Data Preprocessing
    9.3.2 Lattice Behavioral Access Rate (LBAW)
    9.3.3 Social Spider Comp Feature Section (S2CFS)
    9.3.4 Mutual Scaling Features and Ranking
    9.3.5 Soft-Max Logical Activation Function (SmLAF)
    9.3.6 Spread Spectral Recurrent Neural Network (S2RNN)
    9.4 Result and Discussion
    9.5 Conclusion
    References
    Chapter 10: Provably Secure Role Delegation Scheme for Medical Cyber-Physical Systems
    10.1 Introduction
    10.1.1 Proxy Signature Technique
    10.1.2 Forward-Secure Technique
    10.2 Related Work
    10.2.1 Case Study
    10.3 Framework for Proposed Methodology
    10.3.1 The Proposed PB-FSPS Algorithm
    Setup Phase
    System Initialization/Define Public Parameters
    Warrant Generation Phase
    Warrant Verification Phase
    Forward-Secure Proxy Key Generation
    Forward-Secure Proxy Signature Generation
    Forward-Secure Proxy Signature Verification
    Correctness of Proposed Algorithm
    10.4 Protocol Analysis Using BAN Logic
    10.4.1 Idealized Protocol
    10.4.2 Initial Assumptions
    10.4.3 Goals
    10.4.4 Protocol Analysis
    Consider Message 2
    Consider Message 3
    10.5 Simulation Study of PB-FSPS
    10.6 Conclusion
    References
    Chapter 11: FRAME Routing to Handle Security Attacks in Wireless Sensor Networks
    11.1 Introduction
    11.2 Literature Survey
    11.3 FRAME Routing Algorithm
    11.3.1 FRAME Routing
    11.3.2 Bayesian Network
    11.4 Results and Discussion
    11.4.1 AODV Without Attacks
    11.4.2 AODV with Attacks
    11.4.3 FRAME Without Attacks
    11.4.4 FRAME with Attacks
    11.5 Conclusion
    11.5.1 Summary of the Work
    11.5.2 Performance Analysis and Conclusion
    11.5.3 Future Scope
    References
    Chapter 12: A Blockchain Security Management Based on Rehashing Shift Code Rail Encryption Using Circular Shift Round Random Padding Key for Decentralized Cloud Environment
    12.1 Introduction
    12.2 Related Work
    12.3 Problem Consideration
    12.4 Materials and Methods for Improved Blockchain Security
    12.5 Hyperledger Transaction Security
    12.6 Smart Contracting Security
    12.7 Blockchain Initialization
    12.8 Padding Key Substitution-Algorithm
    12.9 Hash Key Generation on Padding
    12.10 Circular Shifting Block Generation
    12.11 Rehashing Shift Code Rail Encryption
    12.12 Peer Verification on Exponential Session
    12.13 Verified Authenticity Key Logs
    12.14 Result and Discussion
    12.15 Conclusion
    References
    Chapter 13: Application of Exact Barrier-Penalty Function for Developing Privacy Mechanisms in Cyber-Physical Systems
    13.1 Introduction
    13.2 Related Work
    13.3 Problem Formulation
    13.4 Proposed Mechanism
    13.5 Experimental Results
    13.6 Future Scope
    13.7 Conclusion
    References
    Index


    πŸ“œ SIMILAR VOLUMES


    Enterprise Security: A Data-Centric Appr
    ✍ Aaron Woody πŸ“‚ Library πŸ“… 2013 πŸ› Packt Publishing 🌐 English

    <p>A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise</p> <p><b>Overview</b></p> <ul> <li>Learn sample forms and process flows for quick and easy use.</li> <li>An easy-to-follow reference for implementing information security in the enterpri

    Enterprise Security: A Data-Centric Appr
    ✍ Aaron Woody πŸ“‚ Library πŸ“… 2013 πŸ› Packt Publishing 🌐 English

    <p>A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise</p> <p><b>Overview</b></p> <ul> <li>Learn sample forms and process flows for quick and easy use.</li> <li>An easy-to-follow reference for implementing information security in the enterpri

    Introduction to Information Security. A
    ✍ Timothy Shimeall and Jonathan Spring (Auth.) πŸ“‚ Library πŸ“… 2014 πŸ› Syngress

    <p>Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provid

    Information Security Analytics: Finding
    ✍ Mark Talabis, Robert McPherson, Inez Miyamoto, Jason Martin πŸ“‚ Library πŸ“… 2014 πŸ› Syngress 🌐 English

    <p><i>Information Security Analytics</i> gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.</p> <p><i>Information Securit

    Information Security Analytics: Finding
    ✍ Mark Talabis, Robert McPherson, I Miyamoto, Jason Martin πŸ“‚ Library πŸ“… 2014 πŸ› Syngress 🌐 English

    <p><i>Information Security Analytics</i> gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.</p><p><i>Information Security

    Digital Age--How to approach Cyber Secur
    ✍ Andreas Von Grebmer πŸ“‚ Library πŸ“… 2017 πŸ› Books on Demand 🌐 English

    In the Digital Age you need to find new approaches for Information and Cyber Security. This book describes the risk-based approach to transform information security considering the influences of the human factor. It is intended for people who want to protect the information of an organization in a h