Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cybersecurity Issues in Emerging Technologies [Taylor & Francis e-book]

  • Formāts: 204 pages, 6 Tables, black and white; 18 Line drawings, black and white; 6 Halftones, black and white; 24 Illustrations, black and white
  • Izdošanas datums: 18-Oct-2021
  • Izdevniecība: CRC Press
  • ISBN-13: 9781003109952
  • Taylor & Francis e-book
  • Cena: 111,17 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Standarta cena: 158,81 €
  • Ietaupiet 30%
  • Formāts: 204 pages, 6 Tables, black and white; 18 Line drawings, black and white; 6 Halftones, black and white; 24 Illustrations, black and white
  • Izdošanas datums: 18-Oct-2021
  • Izdevniecība: CRC Press
  • ISBN-13: 9781003109952

This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. 



The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning.

This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques.  Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.

Foreword xiii
Preface xv
Editors xix
Contributors xxi
1 The Evolution of Hardware-Assisted Security
1(20)
George Christou
Giorgos Vasiliadis
Elias Athanasopoulos
Sotiriosioannidis
1.1 Introduction
1(1)
1.2 Threat Landscape
2(2)
1.2.1 Common Software Vulnerabilities
2(1)
1.2.2 Software Exploitation
2(2)
1.3 Security Mechanisms in Hardware
4(6)
1.3.1 Protection Rings
4(1)
1.3.2 Supervisor Mode Execute/Access Prevention
4(1)
1.3.3 Data Execution Prevention
4(1)
1.3.4 Intel Memory Protection Extensions
5(1)
1.3.5 Intel Memory Protection Keys
6(1)
1.3.6 ARM Memory Tagging
7(1)
1.3.7 Instruction Set Randomization
7(1)
1.3.8 Control-Flow Integrity
8(2)
1.3.8.1 Intel Control-flow Enforcement Technology
10(1)
1.3.8.2 ARM Pointer Integrity
10(1)
1.4 Trusted Execution Environments
10(3)
1.4.1 Execute Only Memory
11(1)
1.4.2 Aegis
11(1)
1.4.3 ARM Trust Zone
11(1)
1.4.4 Intel Software Guard Extensions
12(1)
1.5 Hardware Vulnerabilities
13(2)
1.5.1 Transient Instruction Execution
13(1)
1.5.2 Cache as a Side-Channel
14(1)
1.5.3 Proposed Defenses
14(1)
1.6 Conclusion
15(1)
References
16(5)
2 Cybersecurity of the Unmanned Ship
21(22)
Sokratis Katsikas
Georgios Kavallieratos
2.1 Introduction
21(3)
2.2 Architectural Views
24(4)
2.2.1 The Extended Maritime Architecture Framework
24(2)
2.2.2 The CPSs of the Unmanned Ship
26(2)
2.3 Cyber Risks of the Unmanned Ship
28(4)
2.4 Cybersecurity Requirements for the Unmanned Ship
32(4)
2.5 Treating the Cyber Risk of the Unmanned Ship
36(3)
2.6 Conclusions
39(1)
References
39(4)
3 Agile Incident Response in Industrial Control Environments
43(16)
Helge Janicke
Richard Smith
Leandros Maglaras
Allan Cook
Ying He
Fenia Ferra
3.1 Introduction
43(1)
3.2 Complying with Legal Requirements and Guidance for Operators
44(1)
3.3 Current Issues in Managing Incidents in Industrial Control Environments
45(1)
3.4 Agile Approach to Incident Management
46(3)
3.5 Assessment Event
49(6)
3.5.1 The Scenario
49(1)
3.5.2 Blue Team Composition
49(2)
3.5.3 Agile Methodologies
51(1)
3.5.3.1 Sprints
51(1)
3.5.3.2 Sprint Planning
51(1)
3.5.3.3 Sprint Retrospectives
51(1)
3.5.3.4 Scrum Meetings
51(1)
3.5.4 Task Allocation
52(1)
3.5.4.1 Self-Selection of Tasks
52(1)
3.5.4.2 T-Shaped Team
52(1)
3.5.5 Agile Tools
53(1)
3.5.5.1 Incident Backlog
53(1)
3.5.5.2 Scrum Board
54(1)
3.5.5.3 Learning Matrix
55(1)
3.5.6 Event Questionnaires
55(1)
3.6 Discussion and Conclusions
55(1)
3.7 Glossary
56(1)
References
56(3)
4 Multi-Stage Threat Modeling and Security Monitoring in 5GCN
59(18)
Robert Pell
Sotiris Moschoyiannis
Emmanouil Panaousis
4.1 Introduction
59(2)
4.2 Related Work
61(2)
4.2.1 5GCN Threats
62(1)
4.2.2 Multi-Stage Attack Modeling
62(1)
4.3 Threat Modeling of the 5GCN
63(5)
4.3.1 Identification
64(1)
4.3.2 Threat Decomposition
65(1)
4.3.3 Modeling 5GCN Threats as Graphs
66(1)
4.3.4 A 5GCN Threat Graph Example
66(2)
4.4 Graph-Based Security Monitoring for the 5GCN Infrastructure
68(3)
4.5 Open Research Challenges and Future Work
71(3)
4.5.1 Detection of Multi-Stage Attack Scenarios
72(1)
4.5.2 A Centralized Threat Detection Engine
73(1)
4.5.3 A 5G Network TTP Matrix
73(1)
Note
74(1)
References
74(3)
5 Blockchain Technology for 6G Communication Networks: A Vision for the Future
77(20)
Othmane Friha
Mohamed Amine Ferrag
5.2 Introduction
77(3)
5.1.1 Blockchain Overview
78(1)
5.1.1.1 Blockchain Technology Architecture
78(2)
5.2 Blockchain and Cryptography
80(3)
5.2.1 Confidentiality
80(1)
5.2.2 Integrity
81(2)
5.2.3 Availability
83(1)
5.2.4 Privacy
83(1)
5.3 Consensus Mechanism
83(4)
5.3.1 The Consensus Problem
84(1)
5.3.1.1 Ledger Consensus
84(1)
5.3.2 Blockchain Consensus Algorithms
84(1)
5.3.2.1 Proof-Based Algorithms
85(1)
5.3.2.2 Voting-based Algorithms
86(1)
5.4 Blockchain for 6G Networks
87(4)
5.4.1 Challenges in 6G
87(1)
5.4.2 Blockchain-Based Solutions
88(1)
5.4.2.1 Infrastructure Solutions
88(1)
5.4.2.2 Emerging Applications
89(2)
5.5 Discussion
91(1)
5.5.1 Open Research Issues
91(1)
5.6 Conclusion
92(1)
References
93(4)
6 Securing Components on a 5G Core
97(18)
Jorge Proenca
Vasco Pereira
Daniel Fernandes
Marco Sequeira
Pedro Quiterio
Andre Gomes
Paulo Simoes
Tiago Cruz
Luis Cordeiro
6.1 Introduction
97(2)
6.1.1 Security across Previous Generations
97(1)
6.1.2 Structure of the MSG Project
98(1)
6.1.3 The Need to Secure the 5G Core
98(1)
6.1.4 Proposal
98(1)
6.1.5
Chapter Structure
99(1)
6.2 Security in 5G
99(2)
6.2.1 Security Architecture of 5G Networks
99(1)
6.2.2 Current Research
100(1)
6.3 Related Work
101(1)
6.4 Architecture and Components
102(3)
6.4.1 Event Processing and Visualization Platform
102(1)
6.4.2 AppIDPS
103(1)
6.4.2.1 Internal View
103(2)
6.4.2.2 Metrics and Policy Messages
105(1)
6.4.3 NEF
105(1)
6.5 First Results
105(5)
6.5.1 Event Processing and Visualization Platform Tests
105(2)
6.5.2 Network Exposure Function Tests
107(2)
6.5.3 Integration Scenario
109(1)
6.5.3.1 Testbed Description
110(1)
6.5.3.2 Dashboard
110(1)
6.6 Conclusion
110(2)
Acknowledgments
112(1)
Notes
112(1)
References
112(3)
7 RF Jamming Attacks and Countermeasures in Wireless Vehicular Networks
115(22)
Dimitrios Kosmanos
Antonios Argyriou
7.2 Introduction
115(2)
7.1.1 Motivation
116(1)
7.2 RF Jamming Attacks in Vehicular Networks
117(1)
7.3 RF Jamming Classification Using Relative Speed Estimation
118(5)
7.3.1 System Model
119(1)
7.3.2 Jamming Attack Scenarios
120(2)
7.3.3 Estimation of Relative Speed Metric
122(1)
7.3.4 The variations of relative speed (V RS) Algorithm
122(1)
7.3.5 Proposed IDS Based on Supervised Learning
123(1)
7.4 Enhancing the Proposed IDS with Data Fusion Techniques
123(2)
7.5 Simulation and Performance Evaluation
125(6)
7.5.1 Detection Performance under Different Au Values
125(3)
7.5.2 Evaluation under Different Interference Levels
128(3)
7.5.3 Data Fusion Results
131(1)
7.6 Discussion and Conclusions
131(2)
7.7 Glossary
133(1)
References
133(4)
8 Smart Cars and Over-the-Air Updates
137(16)
Panagiotis Efstathiadis
Anna Karanika
Nestoras Chouliaras
Leandros Maglaras
Ioanna Kantzavelou
8.2 Introduction
137(1)
8.2 Benefits
138(1)
8.3 Threats and Vulnerabilities
139(5)
8.3.1 Smart Car Components
140(1)
8.3.2 The Attacker's Targets
140(1)
8.3.3 Over-the-Air Updates and Security Issues
141(1)
8.3.3.1 Classification of OTA Update Attacks
142(1)
8.3.3.2 Attacks on OTA Updates
142(2)
8.4 Existing Solutions
144(3)
8.4.1 Considerations
145(1)
8.4.2 External Protection
145(1)
8.4.3 Internal Protection
146(1)
8.4.4 Update-Specific Protection
147(1)
8.5 Discussion
147(2)
8.6 Conclusions
149(1)
8.7 Glossary
149(1)
References
149(4)
9 Emerging Malware Threats: The Case of Ransomware
153(18)
Aikaterini Vardalaki
Vasileios Vlachos
9.1 Evolution of Ransomware
153(1)
9.2 Emerging Threats
154(3)
9.3 Financial Impact
157(3)
9.4 Ransomware and Social Engineering
160(3)
9.5 Legislation Challenges
163(2)
9.6 Concluding Remarks
165(2)
References
167(4)
10 Holistic Immunization: A Comprehensive Model to Tackle Hybrid Threats in the Cyber Domain
171(14)
Athanasios Kosmopoulos
10.1 Introduction: Background and Driving Forces
171(1)
10.2 Problem Definition - The Cyber Crisis Management
171(8)
10.3 Proposed Model
179(1)
10.4 Concluding Remarks
180(2)
10.5 Glossary
182(1)
References
182(3)
11 The Cyber Skills Gap
185(14)
Ismini Vasileiou
11.1 Introduction
185(1)
11.2 The Skills Gap in the Landscape of Industry 4.0
186(3)
11.2.1 The Skills Gap
186(1)
11.2.2 Tier 1: Employers
187(1)
11.2.3 Tier 2: Academia
187(2)
11.2.4 Tier 3: Government
189(1)
11.3 Defining an Agenda for Cybersecurity Skills
189(2)
11.3.1 Evolution of the Cyber Discipline
189(2)
11.4 A Framework to Address the Skills Gap in Cyber
191(1)
11.5 Recommendations
192(1)
11.6 Conclusion
192(3)
References
195(4)
Index 199
Dr. Leandros A. Maglaras is an Associate Professor in the School of Computer Science and Informatics of De Montfort University, conducting research in the Cyber Security Centre. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained a B.Sc. in Electrical and Computer Engineering from the Aristotle University of Thessaloniki in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004, and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from the University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield. He is featured in Stanford University's list of the world Top 2% scientists for the year 2019. He serves on the Editorial Board of several international peer-reviewed journals such as IEEE Access, Elsevier Array is the author of more than 150 papers in scientific magazines and conferences and is a senior member of the IEEE.

Dr. Ioanna Kantzavelou is an Assistant Professor at the Dept. of Informatics and Computer Engineering at the School of Engineering of the University of West Attica. She received a B.Sc. in Informatics from the Dept. of Informatics of the Technological Educational Institute of Athens, an MSc by Research in Computer Security from the Dept. of Computer Science at the University College Dublin of the National University of Ireland, and a Ph.D. on Intrusion Detection in Information Technology Security from the Dept. of Information and Communication Systems Engineering at the University of the Aegean. She has worked in R&D projects funded by the Greek government, the Irish government, and the EU. Her published work includes chapters in books (IOS Press), conferences and journals, recording remarkable citations in her research work. She has joint editorship of three IOS Press collections. She has been a repetitive reviewer in many international conferences, such as ACM SEC, IEEE TrustCom, IFIP SEC, ESORICS, IEEE CIS, and she is currently a reviewer for high ranking journals, of IEEE, Elsevier, Springer, and Emerald. She is a member of the Greek Computer Society (GCS), of the ACM and of the IEEE Computer Society.