توضیحاتی در مورد کتاب Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings
نام کتاب : Advances in Security of Information and Communication Networks: First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings
عنوان ترجمه شده به فارسی : پیشرفتها در امنیت شبکههای اطلاعات و ارتباطات: اولین کنفرانس بینالمللی، SecNet 2013، قاهره، مصر، 3-5 سپتامبر 2013. مجموعه مقالات
سری :
نویسندگان : Ali Ismail Awad, Aboul-Ella Hassanien, Kensuke Baba
ناشر : Springer
سال نشر : 2013
تعداد صفحات : 260
ISBN (شابک) : 3642405967 , 9783642405969
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 5 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Organization
Table of Contents
Networking Security
NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study
1 Introduction
2 Related Work
3 NETA: A Simulation Framework for NETwork Attacks
3.1 NETA Architecture
4 Implemented Attacks
4.1 IP Dropping Attack
4.2 IP Delay Attack
4.3 Sinkhole Attack
5 Experimental Evaluation
5.1 Common Experimental Environment
5.2 Dropping Attack Evaluation
5.3 Delay Attack Evaluation
5.4 Sinkhole Attack Evaluation
6 Future Work and Conclusions
References
Clustering Based Group Key Management for MANET
1 Introduction
2 Related Work
2.1 MANET Unicast Routing Protocols
2.2 MANET Multicast Routing Protocols
2.3 Security Requirements
2.4 MANET Key Management Overview
2.5 Our Approach
3 Our Group Key Management Scheme
3.1 Notations and Assumptions
3.2 Overview of CGK
3.3 Multicast Group Management
3.4 Group Key Establishment Protocol
4 Discussion
5 Conclusion
References
Chord-Enabled Key Storage and Lookup Scheme
for Mobile Agent-Based Hierarchical WSN
1 Introduction
2 Background and Related Work
2.1 Mobile Agents and WSN
2.2 Chord Algorithm
2.3 Related Work
3 CKSL-MA-HWSN Scheme
3.1 System View and Assumptions
3.2 Operation of the CKSL-MA-HWSN Scheme
3.3 Quantitative Analysis
3.4 Comparison to Related Work
4 Performance Evaluation
4.1 Initialization Phase
4.2 Results Validation
4.3 Effect of MA Itinerary on Number of Control Messages
4.4 Cryptographic Operations
4.5 Effect of MA Itinerary on the Average End-to-End Delay
5 Conclusion and Future Work
References
Hardware Advancements Effects on MANET Development, Application and Research
1 Introduction
2 Recent Hardware Advancements
2.1 Processing Advancements
2.2 Battery Advancements
3 Case Studies of Practical Implementations
3.1 Practical Wireless Ad Hoc Mobile Telecommunications
3.2 COCO Communication
4 Impacts on MANETS Developments
4.1 Routing
4.2 Quality of Service
4.3 Security
5 Conclusions and Future Work
References
A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing
1 Introduction
2 Relevant Previous Work
2.1 Physical Machine Testbeds
2.2 Simulation Testbeds
2.3 Emulation Testbeds
2.4 Virtual Machines Testbeds
2.5 Full System Virtualization Testbeds
2.6 Motivation
3 Virtualized Malware Testbed (VMT) Design and Capabilities
3.1 Architecture, Design and Implementation
4 Experimentation
4.1 Slammer-Like Pseudo Worm
4.2 Experimental Setup
4.3 Experimental Methodology
4.4 Experimental Results
5 Discussion
5.1 Limitations and Future Work
References
A Categorized Trust-Based Message Reporting Scheme for VANETs
1 Introduction
2 Background and Related Work
2.1 Security in VANETs
2.2 Trust Management in VANETs
2.3 Related Work
3 Categorized Trust-Based Message Reporting Scheme forVANETs (CTMR)
3.1 Objectives
3.2 Trust Scheme Basics
3.3 Scheme Design and Trust Evaluation Steps
3.4 Advisory Network
3.5 Penalty System
3.6 Discussion
3.7 Advantages and Comparison versus Related Work
4 CTMR Validation
4.1 Case Study 1
4.2 Case Study 2: Injecting New Comer and Malicious Nodes
5 Conclusion and Future Work
References
Data and Information Security
Blind Watermark Approach for Map Authentication Using Support Vector Machine
1 Introduction
2 Features of Spatial Data: Background
3 The Proposed Blind Watermark Approach for Map Authentication
3.1 Preprocessing
3.2 Support Vector Machine
3.3 Watermarking Algorithm: Generation of Watermark
4 Watermark Verification
4.1 Translation Attack Verification
4.2 Rotation Attack Verification
4.3 Scaling Attack Verification
5 Experimental Results
5.1 Analysis of Visibility
5.2 Robustness Analysis
6 Conclusions
References
High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression
1 Introduction
2 Audio Watermarking
3 Proposed CS-SC Watermarking Framework
3.1 Compressed Sensing Related theory
3.2 Compressed Sensing (CS) Watermarking Paradigm
3.3 Sparse Coding (SC) Interpretation
3.4 Watermark Embedding
3.5 Watermark Extraction
4 Adaptive Watermark Selection Algorithm
4.1 Adaptive Watermark Atom Selection Algorithm Steps
5 Related Work in CS Watermarking
6 Experimental Results
7 Conclusion and Future Work
References
An HMM-Based Reputation Model
1 Introduction
2 Hidden Markov Models (HMMs)
2.1 Baum-Welch Algorithm
3 Hmm-Based Trust Model
4 Hmm-Reputation Model
5 Experimental Evaluation
6 Conclusion
References
Towards IT-Legal Framework for Cloud Computing
1 Introduction
2 Cloud Computing Legal Problems Definition
2.1 Problems Inter-related with Legal Issues
2.2 Cloud Computing Legal Problem Components
3 Our Proposed Legal Framework
3.1 The Main Pyramid
3.2 The Surrounding Cyclic Arrows EEEEF
3.3 IT-Legal Framework Integration Value
4 Conclusions and Future Works
References
A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps
1 Introduction
2 Related Work
3 Preliminaries
3.1 Self Organizing Maps
3.2 Progressive Mesh
4 The Proposed 3D Watermarking Scheme
4.1 Vertex Selection Using SOM
4.2 Watermark Insertion Procedure
4.3 Watermark Extraction Method and 3D Mesh Reconstruction
5 Experimental Results and Discussion
5.1 Distortion Evaluation
5.2 Robustness Evaluation
6 Conclusions and Future Work
References
Authentication and Privacy
A Cattle Identification Approach Using Live Captured Muzzle Print Images
1 Introduction
2 Human Biometrics Technology
3 Proposed Identification Approach
4 Experimental Work
4.1 Muzzle Print Images Database
4.2 Evaluation Results
5 Conclusions and Future Work
References
Algebraic Replay Attacks on Authentication in RFID Protocols
1 Introduction
2 Formal Automatic Verification
2.1 Intruder Model
2.2 Protocol Goals
2.3 Specification
2.4 Verification Tools
3 RFID Authentication Protocols
4 Results of Verification
4.1 OFMC Result
4.2 CL-Atse Result
5 Discussion
6 Conclusion
References
A Privacy Preserving Approach to Smart Metering
1 Introduction
2 Related Work
3 Proposed Metering Approach
3.1 Home Meters
3.2 Zone Meters
4 Privacy Assessment
4.1 Simulation Environment
4.2 Appliance Detection
5 Conclusion
References
Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware
1 Introduction
2 Background and Related Work
3 Intelligent Intrusion Detection and Prevention System (IIDPS)
3.1 SIDS Stage
3.2 AIDS Stage
3.3 Response Action Stage
4 Conclusion
References
Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study
1 Introduction
2 Vulnerability Assessment and Vulnerability Scanners
2.1 Vulnerability Scanners False Alerting
2.2 Tested Vulnerability Scanners
3 Microsoft Update
4 Security Impacts Related to Microsoft Released Patches
5 Comparative Study
5.1 First Phase
5.2 Second Phase
6 Conclusions
References
Security Applications
Elderly Healthcare Data Protection Application for Ambient Assisted Living
1 Introduction
2 Healthcare Data Protection
3 The Proposed Elderly Protection Approach
3.1 Architecture and Functionality
3.2 Experimental Population and Data Protection Application
4 Conclusion and Future Work
References
A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics
1 Introduction
2 Related Work
3 High Level Overview
4 Security Framework Description
4.1 Operating System Support
4.2 OTA Update Protocol
4.3 Encryption Protocol
4.4 Biometric Authentication
5 Results
6 Conclusion
References
Machine Learning Techniques for Anomalies Detection and Classification
1 Introduction
2 Background
2.1 Anomaly Intrusion Detection
2.2 Principal Component Analysis
2.3 Machine Learning for Classification
3 Experimental Results and Discussion
3.1 Detectors Generation
3.2 Anomalies Classification Process
3.3 Results
4 Conclusion
References
Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing
1 Introduction
2 Background and Related Work
2.1 Web Application Architecture
2.2 Web Application Vulnerability
2.3 Techniques to Detect Vulnerability
3 The Proposed Framework
4 Results and Discussion
5 Conclusion
References
Linear Correlation-Based Feature Selection for Network Intrusion Detection Model
1 Introduction
2 Data Preprocessing
2.1 Feature Selection
2.2 Linear Correlation
3 Network Intrusion DataSet: The NSL-KDD
4 Modeling the Linear Correlation Based FS for Network Intrusion Detection
4.1 Layer 1: Finding the Correlation between the Features
4.2 Layer 2: Finding the Correlation between the Selected Features and the Classes
4.3 Layer 3: Intrusion Classification
5 Experiments and Analysis
5.1 Evaluation Criteria
5.2 Results and Discussions
6 Conclusion
References
Author Index