Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cyber Security and Network Security [Wiley Online]

Edited by (CHRIST (Deemed to be University), Bangalore, India), Edited by (CHRIST (Deemed to be University) Bengaluru, India), Edited by (Haldia Institute of Technology, India), Edited by (CHRIST (Deemed to be University), India)
  • Formāts: 320 pages
  • Sērija : Advances in Cyber Security
  • Izdošanas datums: 29-Apr-2022
  • Izdevniecība: Wiley-Scrivener
  • ISBN-10: 1119812550
  • ISBN-13: 9781119812555
Citas grāmatas par šo tēmu:
  • Wiley Online
  • Cena: 198,60 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Formāts: 320 pages
  • Sērija : Advances in Cyber Security
  • Izdošanas datums: 29-Apr-2022
  • Izdevniecība: Wiley-Scrivener
  • ISBN-10: 1119812550
  • ISBN-13: 9781119812555
Citas grāmatas par šo tēmu:

CYBER SECURITY AND NETWORK SECURITY

Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals.

Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels.

This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.

Preface xv
Acknowledgments xxiii
1 Securing Cloud-Based Enterprise Applications and Its Data
1(26)
Subhradip Debnath
Aniket Das
Budhaditya Sarkar
1.1 Introduction
2(1)
1.2 Background and Related Works
3(2)
1.3 System Design and Architecture
5(4)
1.3.1 Proposed System Design and Architecture
5(1)
1.3.2 Modules
5(1)
1.3.2.1 Compute Instances
5(1)
1.3.2.2 API Gateway
6(1)
1.3.2.3 Storage Bucket (Amazon S3)
6(1)
1.3.2.4 Lambda
6(1)
1.3.2.5 Load Balancer
6(1)
1.3.2.6 Internet Gateway
6(1)
1.3.2.7 Security Groups
7(1)
1.3.2.8 Autoscaling
7(1)
1.3.2.9 QLDB
7(1)
1.3.2.10 NoSQL Database
8(1)
1.3.2.11 Linux Instance and Networking
8(1)
1.3.2.12 Virtual Network and Subnet Configuration
8(1)
1.4 Methodology
9(12)
1.4.1 Firewall
9(1)
1.4.2 Malware Injection Prevention
9(1)
1.4.3 Man-in-the-Middle Prevention
9(1)
1.4.4 Data at Transit and SSL
9(1)
1.4.5 Data Encryption at Rest
10(1)
1.4.6 Centralized Ledger Database
10(1)
1.4.7 NoSQL Database
10(1)
1.4.8 Linux Instance and Server Side Installations
10(11)
1.5 Performance Analysis
21(2)
1.5.1 Load Balancer
21(1)
1.5.2 Lambda (For Compression of Data)
22(1)
1.5.3 Availability Zone
23(1)
1.5.4 Data in Transit (Encryption)
23(1)
1.5.5 Data in Rest (Encryption)
23(1)
1.6 Future Research Direction
23(1)
1.7 Conclusion
24(3)
References
25(2)
2 High-Performance Computing-Based Scalable "Cloud Forensics-as-a-Service" Readiness Framework Factors--A Review
27(20)
Srinivasa Rao Gundu
Charanarur Panem
S. Satheesh
2.1 Introduction
28(1)
2.2 Aim of the Study
29(1)
2.3 Motivation for the Study
29(1)
2.4 Literature Review
30(2)
2.5 Research Methodology
32(1)
2.6 Testing Environment Plan
32(3)
2.7 Testing
35(7)
2.7.1 Scenario 1: Simultaneous Imaging and Upload and Encryption
36(5)
2.7.2 Scenario 2: Real-Time Stream Processing
41(1)
2.7.3 Scenario 3: Remote Desktop Connection, Performance Test
41(1)
2.8 Recommendations
42(1)
2.9 Limitations of Present Study
42(1)
2.10 Conclusions
43(1)
2.11 Scope for the Future Work
43(4)
Acknowledgements
44(1)
References
44(3)
3 Malware Identification, Analysis and Similarity
47(24)
Subhradip Debnath
Soumyanil Biswas
3.1 Introduction
48(1)
3.1.1 Goals of Malware Analysis and Malware Identification
48(1)
3.1.2 Common Malware Analysis Techniques
49(1)
3.2 Background and Related Works
49(2)
3.3 Proposed System Design Architecture
51(11)
3.3.1 Tool Requirement, System Design, and Architecture
51(1)
3.3.1.1 For Static Malware Analysis
51(5)
3.3.1.2 For Dynamic Malware Analysis
56(6)
3.4 Methodology
62(5)
3.5 Performance Analysis
67(1)
3.6 Future Research Direction
67(1)
3.7 Conclusion
68(3)
References
68(3)
4 Robust Fraud Detection Mechanism
71(24)
Balajee Maram
Veerraju Gampala
Satish Muppidi
T. Daniya
4.1 Introduction
72(4)
4.2 Related Work
76(15)
4.2.1 Blockchain Technology for Online Business
76(3)
4.2.2 Validation and Authentication
79(2)
4.2.3 Types of Online Shopping Fraud
81(1)
4.2.3.1 Software Fraudulent of Online Shopping
81(1)
4.2.4 Segmentation/Authentication
82(1)
4.2.4.1 Secure Transaction Though Segmentation Algorithm
83(2)
4.2.4.2 Critical Path Segmentation Optimization
85(2)
4.2.5 Role of Blockchain Technology for Supply Chain and Logistics
87(4)
4.3 Conclusion
91(4)
References
92(3)
5 Blockchain-Based Identity Management Systems
95(34)
Ramani Selvanambi
Bhavya Taneja
Priyal Agrawal
Henil Jayesh Thakor
Marimuthu Karuppiah
5.1 Introduction
96(3)
5.2 Preliminaries
99(10)
5.2.1 Identity Management Systems
99(1)
5.2.1.1 Identity Factors
99(1)
5.2.1.2 Architecture of Identity Management Systems
99(1)
5.2.1.3 Types of Identity Management Systems
100(1)
5.2.1.4 Importance of Identity Management Systems
101(1)
5.2.2 Blockchain
102(1)
5.2.2.1 Blockchain Architecture
102(1)
5.2.2.2 Components of Blockchain Architecture
102(1)
5.2.2.3 MerkleTree
103(1)
5.2.2.4 Consensus Algorithm
103(2)
5.2.2.5 Types of Blockchain Architecture
105(1)
5.2.3 Challenges
106(3)
5.3 Blockchain-Based Identity Management System
109(13)
5.3.1 Need for Blockchain-Based Identity Management Systems
109(1)
5.3.2 Approaches for Blockchain-Based Identity Management Systems
110(1)
5.3.3 Blockchain-Based Identity Management System Implementations
111(9)
5.3.4 Impact of Using Blockchain-Based Identity Management on Business and Users
120(1)
5.3.5 Various Use Cases of Blockchain Identity Management
121(1)
5.4 Discussion
122(1)
5.4.1 Challenges Related to Identity
122(1)
5.4.2 Cost Implications
123(1)
5.5 Conclusion
123(1)
5.6 Future Scope
124(5)
References
125(4)
6 Insights Into Deep Steganography: A Study of Steganography Automation and Trends
129(28)
R. Gurunath
Debabrata Samanta
Digvijay Pandey
6.1 Introduction
130(1)
6.2 Convolution Network Learning
131(2)
6.2.1 CNN Issues
132(1)
6.3 Recurrent Neural Networks
133(3)
6.3.1 RNN Forward Propagation
135(1)
6.4 Long Short-Term Memory Networks
136(2)
6.4.1 LSTM Issues
137(1)
6.5 Back Propagation in Neural Networks
138(2)
6.6 Literature Survey on Neural Networks in Steganography
140(5)
6.6.1 TS-RNN: Text Steganalysis Based on Recurrent Neural Networks
140(1)
6.6.2 Generative Text Steganography Based on LSTM Network and Attention Mechanism with Keywords
141(1)
6.6.3 Graph-Stega: Semantic Controllable Steganographic Text Generation Guided by Knowledge Graph
142(1)
6.6.4 RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model
143(1)
6.6.5 Steganalysis and Payload Estimation of Embedding in Pixel Differences Using Neural Networks
144(1)
6.6.6 Reversible Data Hiding Using Multilayer Perceptron-Based Pixel Prediction
144(1)
6.6.7 Neural Network-Based Steganography Algorithm for Still Images
145(1)
6.7 Optimization Algorithms in Neural Networks
145(6)
6.7.1 Gradient Descent
145(1)
6.7.1.1 GD Issues
146(1)
6.7.2 Stochastic Gradient Descent
147(1)
6.7.2.1 SGD Issues
148(1)
6.7.3 SGD with Momentum
148(1)
6.7.4 Mini Batch SGD
149(1)
6.7.4.1 Mini Batch SGD Issues
149(1)
6.7.5 Adaptive Gradient Algorithm
149(2)
6.8 Conclusion
151(6)
References
151(6)
7 Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System
157(12)
Manas Kumar Yogi
A.S.N. Chakravarthy
7.1 Introduction
157(2)
7.2 Problem Formulation
159(1)
7.3 Proposed Mechanism
160(2)
7.4 Experimental Results
162(4)
7.5 Future Scope
166(1)
7.6 Conclusion
167(2)
References
168(1)
8 Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission
169(24)
Binay Kumar Pandey
Digvijay Pandey
Subodh Wairya
Gaurav Agarwal
Pankaj Dadeech
Sanwta Ram Dogiwal
Sabyasachi Pramanik
8.1 Introduction
170(2)
8.2 Review of Literature
172(8)
8.3 Methodology Used
180(2)
8.4 Results and Discussion
182(4)
8.5 Conclusions
186(7)
References
187(6)
9 Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN)
193(24)
Devasis Pradhan
Prasanna Kumar Sahu
Nitin S. Goje
Mangesh M. Ghonge
Hla Myo Tun
R. Rajeswari
Sabyasachi Pramanik
9.1 Introduction
194(1)
9.2 Overview of 5G
195(1)
9.3 Key Enabling Techniques for 5G
196(4)
9.4 5G Green Network
200(2)
9.5 5G Technologies: Security and Privacy Issues
202(3)
9.5.1 5G Security Architecture
203(1)
9.5.2 Deployment Security in 5G Green Network
204(1)
9.5.3 Protection of Data Integrity
204(1)
9.5.4 Artificial Intelligence
204(1)
9.6 5G-GN Assets and Threats
205(1)
9.7 5G-GN Security Strategies and Deployments
205(3)
9.8 Risk Analysis of 5G Applications
208(1)
9.9 Countermeasures Against Security and Privacy Risks
209(1)
9.9.1 Enhanced Mobile Broadband
209(1)
9.9.2 Ultra-Reliable Low Latency Communications
209(1)
9.10 Protecting 5G Green Networks Against Attacks
210(1)
9.11 Future Challenges
211(1)
9.12 Conclusion
212(5)
References
213(4)
10 A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology
217(16)
Subhodip Mukherjee
Debabrata Sarddar
Rajesh Bose
Sandip Roy
10.1 Introduction
218(2)
10.2 Literature Survey
220(1)
10.2.1 Virtualization
220(1)
10.3 Problem Statement
221(1)
10.3.1 VMware Workstation
222(1)
10.4 Green it Using Virtualization
222(1)
10.5 Proposed Work
223(7)
10.5.1 Proposed Secure Virtual Framework
225(5)
10.6 Conclusion
230(3)
Acknowledgments
230(1)
References
230(3)
11 Big Data Architecture for Network Security
233(36)
Dr. Bijender Bansal
V. Nisha Jenipher
Rituraj Jain
Dr. R. Dilip
Prof. Makhan Kumbhkar
Sabyasachi Pramanik
Sandip Roy
Ankur Gupta
11.1 Introduction to Big Data
234(18)
11.1.1 10 Vs of Big-Data
235(2)
11.1.2 Architecture of Big Data
237(1)
11.1.3 Big Data Access Control
238(1)
11.1.4 Classification of Big Data
239(1)
11.1.4.1 Structured Data
239(1)
11.1.4.2 Unstructured Data
240(1)
11.1.4.3 Semi-Structured Data
240(1)
11.1.5 Need of Big Data
241(1)
11.1.6 Challenges to Big Data Management
241(1)
11.1.7 Big Data Hadoop
242(1)
11.1.8 Big Data Hadoop Architecture
242(1)
11.1.9 Security Factors
242(1)
11.1.10 Performance Factors
243(1)
11.1.11 Security Threats
244(2)
11.1.12 Big Data Security Threats
246(1)
11.1.13 Distributed Data
247(1)
11.1.14 Non-Relational Databases
247(1)
11.1.15 Endpoint Vulnerabilities
247(1)
11.1.16 Data Mining Solutions
248(1)
11.1.17 Access Controls
248(1)
11.1.18 Motivation
249(1)
11.1.19 Importance and Relevance of the Study
250(1)
11.1.20 Background History
250(2)
11.1.21 Research Gaps
252(1)
11.2 Technology Used to Big Data
252(2)
11.2.1 MATLAB
252(1)
11.2.2 Characteristics of MATLAB
253(1)
11.2.3 Research Objectives
253(1)
11.2.4 Methodology
254(1)
11.3 Working Process of Techniques
254(1)
11.3.1 File Splitter
254(1)
11.3.2 GUI Interface for Client
254(1)
11.3.3 GUI Interface for Server
254(1)
11.3.4 Encrypted File
255(1)
11.4 Proposed Work
255(2)
11.4.1 Working
255(1)
11.4.2 Process Flow of Proposed Work
255(1)
11.4.3 Proposed Model
255(2)
11.5 Comparative Analysis
257(5)
11.5.1 Time Comparison
257(1)
11.5.2 Error Rate Comparison
258(1)
11.5.3 Packet Size Comparison
258(1)
11.5.4 Packet Affected Due to Attack
258(4)
11.6 Conclusion and Future Scope
262(7)
11.6.1 Conclusion
262(1)
11.6.2 Future Scope
263(1)
References
264(5)
About the Editors 269(2)
Index 271
Sabyasachi Pramanik is an assistant professor in the Department of Computer Science and Engineering, Haldia Institute of Technology, India. He earned his PhD in computer science and engineering from the Sri Satya Sai University of Technology and Medical Sciences, Bhopal, India. He has more than 50 publications in various scientific and technical conferences, journals, and online book chapter contributions. He is also serving as the editorial board member on many scholarly journals and has authored one book. He is an editor of various books from a number of publishers, including Scrivener Publishing.

Debabrata Samanta, PhD, is an assistant professor in the Department of Computer Science, Christ University, Bangalore, India. He obtained his PhD in from the National Institute of Technology, Durgapur, India, and he is the owner of 20 patents and two copyrights. He has authored or coauthored over 166 research papers in international journals and conferences and has received the Scholastic Award at the Second International Conference on Computer Science and IT application in Delhi, India. He is a co-author of 11 books and the co-editor of seven books and has presented various papers at international conferences and received Best Paper awards. He has authored o co-authored 20 Book Chapters.

M. Vinay, PhD, obtained his PhD at JJT University Rajasthan for Computer Science and is an assistant professor of computer science at Christ University, Bengaluru, India. With over 14 years of teaching, he has received numerous prestigious teaching awards. He has given more than 30 invited talks, 35 guests lectures and conducted more than 25 workshops, He has also published over a dozen papers in distinguished scholarly journals.

Abhijit Guha is pursuing a doctorate with the Department of Data Science, Christ University, India. He is currently working as a research and development scientist with First American India Private Ltd. He received three consecutive Innovation of the Year awards, from 2015 to 2017, by First American India for his contribution towards his research.