Cyber Security and Network Security
Wiley-Scrivener (Verlag)
978-1-119-81249-4 (ISBN)
Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals.
Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels.
This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.
Sabyasachi Pramanik is an assistant professor in the Department of Computer Science and Engineering, Haldia Institute of Technology, India. He earned his PhD in computer science and engineering from the Sri Satya Sai University of Technology and Medical Sciences, Bhopal, India. He has more than 50 publications in various scientific and technical conferences, journals, and online book chapter contributions. He is also serving as the editorial board member on many scholarly journals and has authored one book. He is an editor of various books from a number of publishers, including Scrivener Publishing. Debabrata Samanta, PhD, is an assistant professor in the Department of Computer Science, Christ University, Bangalore, India. He obtained his PhD in from the National Institute of Technology, Durgapur, India, and he is the owner of 20 patents and two copyrights. He has authored or coauthored over 166 research papers in international journals and conferences and has received the “Scholastic Award” at the Second International Conference on Computer Science and IT application in Delhi, India. He is a co-author of 11 books and the co-editor of seven books and has presented various papers at international conferences and received Best Paper awards. He has authored o co-authored 20 Book Chapters. M. Vinay, PhD, obtained his PhD at JJT University Rajasthan for Computer Science and is an assistant professor of computer science at Christ University, Bengaluru, India. With over 14 years of teaching, he has received numerous prestigious teaching awards. He has given more than 30 invited talks, 35 guests lectures and conducted more than 25 workshops, He has also published over a dozen papers in distinguished scholarly journals. Abhijit Guha is pursuing a doctorate with the Department of Data Science, Christ University, India. He is currently working as a research and development scientist with First American India Private Ltd. He received three consecutive “Innovation of the Year” awards, from 2015 to 2017, by First American India for his contribution towards his research.
Preface xv
Acknowledgments xxiii
1 Securing Cloud-Based Enterprise Applications and Its Data 1
Subhradip Debnath, Aniket Das and Budhaditya Sarkar
1.1 Introduction 2
1.2 Background and Related Works 3
1.3 System Design and Architecture 5
1.3.1 Proposed System Design and Architecture 5
1.3.2 Modules 5
1.3.2.1 Compute Instances 5
1.3.2.2 API Gateway 6
1.3.2.3 Storage Bucket (Amazon S3) 6
1.3.2.4 Lambda 6
1.3.2.5 Load Balancer 6
1.3.2.6 Internet Gateway 6
1.3.2.7 Security Groups 7
1.3.2.8 Autoscaling 7
1.3.2.9 QLDB 7
1.3.2.10 NoSQL Database 8
1.3.2.11 Linux Instance and Networking 8
1.3.2.12 Virtual Network and Subnet Configuration 8
1.4 Methodology 9
1.4.1 Firewall 9
1.4.2 Malware Injection Prevention 9
1.4.3 Man-in-the-Middle Prevention 9
1.4.4 Data at Transit and SSL 9
1.4.5 Data Encryption at Rest 10
1.4.6 Centralized Ledger Database 10
1.4.7 NoSQL Database 10
1.4.8 Linux Instance and Server Side Installations 10
1.5 Performance Analysis 21
1.5.1 Load Balancer 21
1.5.2 Lambda (For Compression of Data) 22
1.5.3 Availability Zone 23
1.5.4 Data in Transit (Encryption) 23
1.5.5 Data in Rest (Encryption) 23
1.6 Future Research Direction 23
1.7 Conclusion 24
References 25
2 High-Performance Computing-Based Scalable “Cloud Forensicsas- a-Service” Readiness Framework Factors—A Review 27
Srinivasa Rao Gundu, Charanarur Panem and S. Satheesh
2.1 Introduction 28
2.2 Aim of the Study 29
2.3 Motivation for the Study 29
2.4 Literature Review 30
2.5 Research Methodology 32
2.6 Testing Environment Plan 32
2.7 Testing 35
2.7.1 Scenario 1: Simultaneous Imaging and Upload and Encryption 36
2.7.2 Scenario 2: Real-Time Stream Processing 41
2.7.3 Scenario 3: Remote Desktop Connection, Performance Test 41
2.8 Recommendations 42
2.9 Limitations of Present Study 42
2.10 Conclusions 43
2.11 Scope for the Future Work 43
Acknowledgements 44
References 44
3 Malware Identification, Analysis and Similarity 47
Subhradip Debnath and Soumyanil Biswas
3.1 Introduction 48
3.1.1 Goals of Malware Analysis and Malware Identification 48
3.1.2 Common Malware Analysis Techniques 49
3.2 Background and Related Works 49
3.3 Proposed System Design Architecture 51
3.3.1 Tool Requirement, System Design, and Architecture 51
3.3.1.1 For Static Malware Analysis 51
3.3.1.2 For Dynamic Malware Analysis 56
3.4 Methodology 62
3.5 Performance Analysis 67
3.6 Future Research Direction 67
3.7 Conclusion 68
References 68
4 Robust Fraud Detection Mechanism 71
Balajee Maram, Veerraju Gampala, Satish Muppidi and T. Daniya
4.1 Introduction 72
4.2 Related Work 76
4.2.1 Blockchain Technology for Online Business 76
4.2.2 Validation and Authentication 79
4.2.3 Types of Online Shopping Fraud 81
4.2.3.1 Software Fraudulent of Online Shopping 81
4.2.4 Segmentation/Authentication 82
4.2.4.1 Secure Transaction Though Segmentation Algorithm 83
4.2.4.2 Critical Path Segmentation Optimization 85
4.2.5 Role of Blockchain Technology for Supply Chain and Logistics 87
4.3 Conclusion 91
References 92
5 Blockchain-Based Identity Management Systems 95
Ramani Selvanambi, Bhavya Taneja, Priyal Agrawal, Henil Jayesh Thakor and Marimuthu Karuppiah
5.1 Introduction 96
5.2 Preliminaries 99
5.2.1 Identity Management Systems 99
5.2.1.1 Identity Factors 99
5.2.1.2 Architecture of Identity Management Systems 99
5.2.1.3 Types of Identity Management Systems 100
5.2.1.4 Importance of Identity Management Systems 101
5.2.2 Blockchain 102
5.2.2.1 Blockchain Architecture 102
5.2.2.2 Components of Blockchain Architecture 102
5.2.2.3 Merkle Tree 103
5.2.2.4 Consensus Algorithm 103
5.2.2.5 Types of Blockchain Architecture 105
5.2.3 Challenges 106
5.3 Blockchain-Based Identity Management System 109
5.3.1 Need for Blockchain-Based Identity Management Systems 109
5.3.2 Approaches for Blockchain-Based Identity Management Systems 110
5.3.3 Blockchain-Based Identity Management System Implementations 111
5.3.4 Impact of Using Blockchain-Based Identity Management on Business and Users 120
5.3.5 Various Use Cases of Blockchain Identity Management 121
5.4 Discussion 122
5.4.1 Challenges Related to Identity 122
5.4.2 Cost Implications 123
5.5 Conclusion 123
5.6 Future Scope 124
References 125
6 Insights Into Deep Steganography: A Study of Steganography Automation and Trends 129
R. Gurunath, Debabrata Samanta and Digvijay Pandey
6.1 Introduction 130
6.2 Convolution Network Learning 131
6.2.1 CNN Issues 132
6.3 Recurrent Neural Networks 133
6.3.1 RNN Forward Propagation 135
6.4 Long Short-Term Memory Networks 136
6.4.1 LSTM Issues 137
6.5 Back Propagation in Neural Networks 138
6.6 Literature Survey on Neural Networks in Steganography 140
6.6.1 TS-RNN: Text Steganalysis Based on Recurrent Neural Networks 140
6.6.2 Generative Text Steganography Based on LSTM Network and Attention Mechanism with Keywords 141
6.6.3 Graph-Stega: Semantic Controllable Steganographic Text Generation Guided by Knowledge Graph 142
6.6.4 RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model 143
6.6.5 Steganalysis and Payload Estimation of Embedding in Pixel Differences Using Neural Networks 144
6.6.6 Reversible Data Hiding Using Multilayer Perceptron–Based Pixel Prediction 144
6.6.7 Neural Network–Based Steganography Algorithm for Still Images 145
6.7 Optimization Algorithms in Neural Networks 145
6.7.1 Gradient Descent 145
6.7.1.1 GD Issues 146
6.7.2 Stochastic Gradient Descent 147
6.7.2.1 SGD Issues 148
6.7.3 SGD with Momentum 148
6.7.4 Mini Batch SGD 149
6.7.4.1 Mini Batch SGD Issues 149
6.7.5 Adaptive Gradient Algorithm 149
6.8 Conclusion 151
References 151
7 Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System 157
Manas Kumar Yogi and A.S.N. Chakravarthy
7.1 Introduction 157
7.2 Problem Formulation 159
7.3 Proposed Mechanism 160
7.4 Experimental Results 162
7.5 Future Scope 166
7.6 Conclusion 167
References 168
8 Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission 169
Binay Kumar Pandey, Digvijay Pandey, Subodh Wairya, Gaurav Agarwal, Pankaj Dadeech, Sanwta Ram Dogiwal and Sabyasachi Pramanik
8.1 Introduction 170
8.2 Review of Literature 172
8.3 Methodology Used 180
8.4 Results and Discussion 182
8.5 Conclusions 186
References 187
9 Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN) 193
Devasis Pradhan, Prasanna Kumar Sahu, Nitin S. Goje, Mangesh M. Ghonge, Hla Myo Tun, Rajeswari R and Sabyasachi Pramanik
9.1 Introduction 194
9.2 Overview of 5G 195
9.3 Key Enabling Techniques for 5G 196
9.4 5G Green Network 200
9.5 5G Technologies: Security and Privacy Issues 202
9.5.1 5G Security Architecture 203
9.5.2 Deployment Security in 5G Green Network 204
9.5.3 Protection of Data Integrity 204
9.5.4 Artificial Intelligence 204
9.6 5G-GN Assets and Threats 205
9.7 5G-GN Security Strategies and Deployments 205
9.8 Risk Analysis of 5G Applications 208
9.9 Countermeasures Against Security and Privacy Risks 209
9.9.1 Enhanced Mobile Broadband 209
9.9.2 Ultra-Reliable Low Latency Communications 209
9.10 Protecting 5G Green Networks Against Attacks 210
9.11 Future Challenges 211
9.12 Conclusion 212
References 213
10 A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology 217
Subhodip Mukherjee, Debabrata Sarddar, Rajesh Bose and Sandip Roy
10.1 Introduction 218
10.2 Literature Survey 220
10.2.1 Virtualization 220
10.3 Problem Statement 221
10.3.1 VMware Workstation 222
10.4 Green it Using Virtualization 222
10.5 Proposed Work 223
10.5.1 Proposed Secure Virtual Framework 225
10.6 Conclusion 230
Acknowledgments 230
References 230
11 Big Data Architecture for Network Security 233
Dr. Bijender Bansal, V.Nisha Jenipher, Rituraj Jain, Dr. Dilip R., Prof. Makhan Kumbhkar, Sabyasachi Pramanik, Sandip Roy and Ankur Gupta
11.1 Introduction to Big Data 234
11.1.1 10 V’s of Big-Data 235
11.1.2 Architecture of Big Data 237
11.1.3 Big Data Access Control 238
11.1.4 Classification of Big Data 239
11.1.4.1 Structured Data 239
11.1.4.2 Unstructured Data 240
11.1.4.3 Semi-Structured Data 240
11.1.5 Need of Big Data 241
11.1.6 Challenges to Big Data Management 241
11.1.7 Big Data Hadoop 242
11.1.8 Big Data Hadoop Architecture 242
11.1.9 Security Factors 242
11.1.10 Performance Factors 243
11.1.11 Security Threats 244
11.1.12 Big Data Security Threats 246
11.1.13 Distributed Data 247
11.1.14 Non-Relational Databases 247
11.1.15 Endpoint Vulnerabilities 247
11.1.16 Data Mining Solutions 248
11.1.17 Access Controls 248
11.1.18 Motivation 249
11.1.19 Importance and Relevance of the Study 250
11.1.20 Background History 250
11.1.21 Research Gaps 252
11.2 Technology Used to Big Data 252
11.2.1 MATLAB 252
11.2.2 Characteristics of MATLAB 253
11.2.3 Research Objectives 253
11.2.4 Methodology 254
11.3 Working Process of Techniques 254
11.3.1 File Splitter 254
11.3.2 GUI Interface for Client 254
11.3.3 GUI Interface for Server 254
11.3.4 Encrypted File 255
11.4 Proposed Work 255
11.4.1 Working 255
11.4.2 Process Flow of Proposed Work 255
11.4.3 Proposed Model 255
11.5 Comparative Analysis 257
11.5.1 Time Comparison 257
11.5.2 Error Rate Comparison 258
11.5.3 Packet Size Comparison 258
11.5.4 Packet Affected Due to Attack 258
11.6 Conclusion and Future Scope 262
11.6.1 Conclusion 262
11.6.2 Future Scope 263
References 264
About the Editors 269
Index 271
Erscheinungsdatum | 22.04.2022 |
---|---|
Reihe/Serie | Advances in Cyber Security |
Sprache | englisch |
Maße | 10 x 10 mm |
Gewicht | 454 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Technik ► Elektrotechnik / Energietechnik | |
ISBN-10 | 1-119-81249-6 / 1119812496 |
ISBN-13 | 978-1-119-81249-4 / 9781119812494 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich