توضیحاتی در مورد کتاب Handbook of Computer Networks and Cyber Security. Principles and Paradigms
نام کتاب : Handbook of Computer Networks and Cyber Security. Principles and Paradigms
عنوان ترجمه شده به فارسی : راهنمای شبکه های کامپیوتری و امنیت سایبری. اصول و پارادایم ها
سری :
نویسندگان : Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
ناشر : Springer
سال نشر : 2020
تعداد صفحات : 957
ISBN (شابک) : 9783030222765 , 9783030222772
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 23 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Acknowledgment
Contents
About the Editors
1 Security Frameworks in Mobile Cloud Computing
1 Introduction
2 Architecture of Mobile Cloud Computing
3 Security Aspects of Mobile Cloud Computing
4 Security Frameworks for Mobile Cloud Computing
4.1 Authentication Frameworks for Mobile Cloud Computing
4.2 Privacy Preserving Security Frameworks for MCC
4.3 Secure Data Storage Frameworks for MCC
4.4 Security Frameworks for Computation Using MCC
5 Attack, Risk Assessment, and Verifiability in Mobile Clouds
6 Summary and Discussion
7 Conclusion
References
2 An Investigation Study of Privacy Preserving in Cloud Computing Environment
1 Introduction
2 Privacy-Preserving Methods
3 Searchable Encryption-Based Techniques
3.1 Symmetric-Key Based Techniques
3.2 Fuzzy-Searchable Encryption
3.3 Public-Key Encryption
4 Conclusion and Future Work
References
3 Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud ComputingCase Study
1 Introduction
2 Motivation: Quantitative Cybersecurity Risk Assessment Models
2.1 Related Work
2.2 Mean Failure Cost Model (MFC): A Quantitative Cybersecurity Risk Assessment Model
2.3 Mean Failure Cost (MFC) Limits
3 Cloud Computing Environments
3.1 Cloud Computing Architecture
3.2 Cloud Computing Security Issues
4 MFCext and MFCint: New Quantitative Security Risk Assessment Models
4.1 Security Threat Space Intrusion
4.1.1 Internal Threats
4.1.2 External Threats
4.1.3 Internal/External Threats
4.2 MFCext and MFCint: The Proposed Model
4.3 Illustration of the Cybersecurity Model: A Cloud Computing System
4.4 Validation of the MFCint and the MFCext
4.5 MFCext and MFCint Limits and Advantages
5 The MFC Extension Model (MFCE)
5.1 The MFCE Model
5.2 Illustration of the MFC Extension Model: Cloud Computing System
5.2.1 The Impact Threats Classes Matrix
5.2.2 The Threat Classes Matrix
5.3 Validation of the MFCE Model
6 Conclusion
References
4 A Novel AckIBE-Based Secure Cloud Data Management Framework
1 Introduction
1.1 Support of Cloud Computing
2 Related Literature
2.1 Security Approaches of Smart Model
3 Basic IB Schemes
3.1 Other IB Schemes
4 Secure Smart Model
4.1 Smart-Model: System Architecture
4.2 Component Views
4.3 Flow of Information Management
5 Security Solutions for Smart Model
5.1 Model Description
5.2 Key Generation
5.2.1 Encryption to Top Cloud
5.2.2 Encryption to IS
5.2.3 Proxy Re-encryption
5.2.4 Signature Generation by Top Cloud
5.2.5 Signature Generation in Regional Cloud
5.2.6 Signature Generation by End-Users
6 Schemes for Secure Framework
6.1 Confidentiality
6.1.1 Encryption to Top Cloud
6.1.2 Encryption to Information Storage
6.1.3 Proxy Re-encryption to Information Storage
6.2 Authentication Service
6.2.1 Signature Generation by End-User Cloud
7 Security Analysis
7.1 Customized Platform
8 Conclusions and Future Scope
References
5 A Practicable Machine Learning Solution for Security-Cognizant Data Placement on Cloud Platforms
1 Introduction
2 Related Work
3 Problem Formulation and Data Placement Optimization Model
3.1 Problem Description
3.2 Retrieval Time
3.3 Security Factor
3.4 Multi-Objective Optimization Model
3.5 Multi-Objective Optimization Algorithm
3.5.1 Crossover
3.5.2 Local Search Procedure
3.5.3 Complete Framework of Algorithm ARRT
3.6 Proposed Security-Cognizant Data Placement (SDP) Strategy
4 Machine Learning for Enhanced Security
4.1 Threat Types
4.2 Machine Learning Model
4.2.1 Motivation
4.2.2 General Description
4.2.3 Attack Model and Training Data
4.2.4 Utilization of Output
5 Experiments and Performance Evaluation
6 Conclusions
References
6 Threats Behind Default Configurations of Network Devices: Wired Local Network Attacks and Their Countermeasures
1 Introduction
2 Background
2.1 Local Network Vulnerabilities
2.2 Network Simulators and Emulators
2.3 Computer Networking Training Based on Virtual Scenarios
3 Materials and Methods
4 Local Network Attacks
4.1 Device Security
4.1.1 Global Protection
4.1.2 Console Connections
4.1.3 Remote Connections
4.2 Link Layer
4.2.1 Spoofing Attacks
4.2.2 Virtual Local Area Networks (VLANs)
4.3 Network Layer
4.3.1 Spoofing Attacks Based on ICMP
4.3.2 Flooding Attacks
4.4 Transport Layer
4.4.1 UDP Flooding Attack
4.4.2 TCP SYN Flooding Attack
4.5 Application Layer
4.5.1 Attacks on the DHCP Protocol
5 Discussion
6 Conclusions
References
7 Security and Privacy Issues in Wireless Sensor and Body Area Networks
1 Introduction
2 Overview of Wireless Sensor and Body Area Networks
2.1 Network Architecture
2.2 Performance Metric
3 Security Threats in WSN and WBAN
4 Similarities and Differences Between WSN and WBAN with Respect to Security Issues
5 Privacy Issues of WSN and WBAN
6 Existing Security and Privacy Solutions for WSN and WBAN
6.1 IEEE 802.11 Security Solutions
6.2 IEEE 802.15.6 Security Solutions
6.3 IEEE 802.15.4 Security Solutions
6.3.1 AES-CTR
6.3.2 AES-CBC-MAC
6.3.3 AES-CCM
6.4 Existing Research Works
7 Potential Applications
8 Open Research Issues
9 Conclusions
References
8 Preventing Security and Privacy Attacks in WBANs
1 Introduction
1.1 Security Threats in WBANs
2 Security Without Encryption in WBANs
2.1 Techniques Using Channel Characteristics
2.1.1 Exploiting Received Signal Strength Indicator to Design Fingerprint
2.1.2 Exploiting Multi-Hop Communications
2.2 Augmenting Security with Compressed Sensing
3 Secure Key Exchange Methods in WBANs for Encryption-Based Cryptosystem
3.1 Asymmetric Key Generation Methods
3.1.1 ECC-Based Key Generation
3.1.2 Third-Party-Based Authentication Scheme Using Asymmetric Keys
3.2 Symmetric Key Generation Methods
3.2.1 Physiological Signal-Based Key Generation
3.2.2 Certification-Based Authentication Scheme Using Symmetric Keys
3.3 Group-Based Cooperation
4 Security in Cloud Assisted WBANs
4.1 Certificateless Cryptography Technique for CAWBANs
4.2 Certification-Based Cryptography Techniques in CAWBANs
4.3 Cloud Computing and Multimedia for Healthcare
5 Preventing Untrustworthy Authorized Users
6 Open Issues
7 Conclusion
References
9 Underwater Wireless Sensor Networks
1 Introduction
2 Underwater Wireless Sensor Networks
2.1 Applications of UWSNs
3 Difference Between Terrestrial WSNs and UWSNs
4 Underwater Sensor Node
5 Communication Architecture for Underwater Wireless Sensor Networks
6 Secure Communication in UWSNs
6.1 Physical Layer
6.2 Data Link Layer
6.3 Network Layer
6.4 Transport Layer
6.5 Application Layer
7 Simulation Tools for UWSNs
8 Open Research Issues
9 Conclusion
References
10 Security Issues in Cognitive Radio Ad Hoc Networks
1 Introduction
1.1 Background
1.2 Cognitive Radio Ad Hoc Networks
1.3 Application of CRAHNs
1.4 Research Issues in CRAHNs
1.5 General Security Objectives
2 The Security Background
2.1 Domains of Security Study in CRAHN
2.2 Classical Security Method
2.3 The Security Requirements in CRAHNs
2.4 Security Issues in CRAHNs
2.5 Generic Security Challenges in CRAHNs
3 Attacks in CRAHNs
4 The Security Approaches
5 Conclusions
References
11 Security and Privacy in Social Networks: Data and Structural Anonymity
1 Introduction
1.1 Contribution
1.2 Online Social Network Model
1.3 Categories of Privacy Breach
1.3.1 User-Based Limitations
1.3.2 Design Flaw Limitation
1.3.3 Implicit Information Flow
1.3.4 Incentive Collision
2 Security in OSN
2.1 Need of Security
2.2 Types of Security Attacks and Threats
2.3 Challenges in Threat Resolution
3 Preserving Privacy and Security
3.1 Anonymizing User Information
3.2 k-Anonymity, l-Diversity and t-Closeness
3.3 Anonymizing Network
4 Techniques for Data Anonymization: Implementation and Comparisons
5 Evaluation of User Privacy Risk
5.1 Privacy Score Model
5.2 Algorithm Results: Discussion and Summary
6 Management of Privacy Settings: Case Studies of OSNs
7 Privacy Preservation in Dynamic Networks
7.1 Link Prediction
7.1.1 Classification Based on Features
7.1.2 Bayesian Probabilistic Model
7.1.3 Probabilistic Relational Model (PRM)
7.2 Link Privacy
7.2.1 Social Link Disclosure
7.2.2 Affiliation Link Disclosure
7.3 De-Anonymization
8 Conclusion
References
12 SOI FinFET for Computer Networks and Cyber Security Systems
1 Introduction
2 Reliability and Flexibility Approach of SOI FinFET Towards Security
3 SOI FinFET Design Consideration and Simulation Setup
4 Performance Exploration and Investigation of SOI FinFET
4.1 Electrostatic Performance Evaluation of SOI FinFET
4.2 Analog Performance Evaluation of SOI FinFET
4.3 RF Performance Evaluation of SOI FinFET
4.4 Extraction of Electrostatic and Analog/RF Performance Parameters
5 Practical Aspects of SOI FinFET Technology
6 Conclusion
References
13 Software-Defined Networking: A Novel Approach to Networks
1 Introduction
1.1 Software-Defined Networking
1.2 Limitations of Other Networking Technologies
1.3 Need of New Architecture
1.4 SDN Architecture
1.5 Components of Software-Defined Networking
1.5.1 Southbound API
1.5.2 Northbound API
1.5.3 West- and Eastbound API
2 Background
2.1 History of Programmable Networks
2.2 OpenFlow Protocol
2.3 Available Versions of OpenFlow Protocol
3 SDN Controllers
3.1 Introduction
3.2 Working of SDN Controller
3.3 Various Available SDN Controllers
4 Working of Software-Defined Networking with Mininet
4.1 Introduction
4.2 Working of Mininet
4.3 Mininet Commands
4.4 Different Topologies Used in Mininet
4.5 Uses of Mininet
4.6 Limitations of Mininet
5 Comparison of Traditional Applications vs Software-Defined Applications
5.1 Introduction
5.2 Traditional Firewall Introduction
5.3 SDN Firewall Introduction
5.4 Why SDN Firewall?
5.5 Introduction to Load Balancer
5.5.1 Need of SDN in Traditional Load Balancer
6 Challenges to SDN
7 Application Areas of SDN
8 Conclusion
References
14 Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions
1 Introduction
2 Software-Defined Network (SDN)
2.1 Architecture and Main Components
2.1.1 Data Plane
2.1.2 Southbound API
2.1.3 Controller or the Network Operating System
2.1.4 Northbound API
2.1.5 Application Plane
2.2 Latest Advances in SDN Data Plane
2.2.1 Adding Multiple Flow Tables to Forwarding Devices
2.2.2 Improving the Match Rule Flexibility
2.2.3 Stateful Data Planes
3 SDN Security Analysis
3.1 Vulnerability Assessment
3.1.1 Centralized Controller
3.1.2 Open Programmable Interfaces
3.1.3 Forwarding Device Management Protocol
3.1.4 Third-Party Network Services
3.1.5 Virtualized Logical Networks
4 Taxonomy of Attacks Against SDNs
4.1 Implementation Attacks
4.2 Enforcement Attacks
4.3 Policy Attacks
4.3.1 Comparative Analysis
5 An Overview of SDN Security Literature
6 Data Plane Security
7 Control Plane Security
8 SDN-Based Security Services
9 Future Research Directions
10 Summary and Conclusion
References
15 Survey on DDoS Attack Techniques and Solutions in Software-Defined Network
1 Introduction
2 Software-Defined Networking Overview
2.1 SDN OpenFlow
2.2 History of SDN
2.3 Standardization of SDN
2.4 SDN Architecture Model: Bottom-Up
2.5 Advantages of SDN over Traditional Networks
3 Security Challenges in Software-Defined Network
3.1 Security Issue in SDN
3.2 Vulnerabilities in SDN
3.3 DDoS Attacks in Conventional Networks
3.4 Effective Characteristics of SDN in Defeating DDoS Attacks
3.5 Potential DDoS Attacks in SDN
3.5.1 Buffer Saturation
3.5.2 Flow Table Overflow
3.5.3 Congestion of Control-Data Plane Channel
3.5.4 Controller Saturation
4 Defence Mechanism Against DDoS Attacks in SDN
4.1 Solutions for Buffer Saturation Attack
4.2 Solutions for Flow Table Overflow
4.3 Solutions for Control-Data Plane Channel Congestion
4.4 Solutions for Controller Saturation
5 Research Challenges
6 Conclusion
References
16 Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks
1 Introduction
2 Motivation
3 Research Objective
4 Statistics
5 Taxonomy of DDoS Attacks
5.1 Architecture of DDoS Attack Network
5.2 Reflector-Based Flooding Attack
5.3 IP Spoofing Based
5.4 Direct Flooding Attack
5.5 Smurf Attack
5.6 TCP SYN Attack
5.7 UDP Flood Attack
5.8 DNS Amplification Attack
6 Taxonomy of Cooperative DDoS Defence Mechanisms
6.1 Pushback and Packet Marking
6.2 IP Traceback and Port Marking
6.3 Signature-Based Defence
6.4 Capability-Based Defence
6.5 Datagram-Based Defence
6.6 Anomaly-Based Defence
6.7 Volume-Based Defence
6.8 Hybrid Defence
7 Literature Review
8 Performance Evaluation Metrics
8.1 Detection Rate
8.2 False Positive Rate
8.3 Ratio Between Detection Rate and False Positive Rate
8.4 Failure Rate
8.5 Average Latency
8.6 Throughput
8.7 Bandwidth
8.8 Malicious Packet Drop Rate
8.9 Benign Packet Drop Rate
9 Conclusion
10 Scope for Future Research
References
17 Epidemic Modelling for the Spread of Bots Through DDoS Attack in E-Commerce Network
1 Introduction
2 Literature Review
3 Modeling the System
4 Solution and Stability
4.1 Equilibrium Points
4.2 Basic Reproduction Number
4.3 Stability of the System
5 Numerical Discussion
5.1 Case 1: All Classes of Nodes vs. Time When R < 1
5.2 Case 2: All Classes of Nodes vs. Time When R > 1
5.3 Case 3. Comparative Study of Si vs. Ibi
6 Conclusion
References
18 Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions
1 Introduction
2 Overview of Security Issues in IoT
2.1 Physical Security
2.2 Network Security
2.2.1 Authentication Failure
2.2.2 Man in the Middle Attack (MitM)
2.2.3 Attacks on Data Integrity
2.2.4 Spoofing
2.2.5 Routing Information Replay Attacks
2.2.6 Byzantine Routing Information Attacks
2.2.7 Availability Attacks
2.2.8 Wormhole Attacks
2.2.9 Overload Attacks
3 Types of Physical Unclonable Function (PUF)
3.1 Arbiter PUF
3.2 Ring Oscillator (RO) PUF
4 PUF Applicability
5 In Bootstrapping
6 Securing Other IoT Aspects
7 More Examples
8 Conclusions
References
19 Fog Computing: Applications and Secure Data Aggregation
1 Introduction and Background
1.1 Fog Computing
1.2 Data Aggregation
2 Applications of Fog Computing
2.1 Related Work
3 Secure Data Aggregation
4 Simulation Tools and Frameworks
5 Conclusion
References
20 A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment
1 Introduction
2 Fog Computing
2.1 Introduction to Fog Computing
2.2 History
2.3 Characteristics and Applications of Fog Computing
2.3.1 Characteristics of Fog Computing
2.3.2 Applications of Fog Computing
2.4 Issues in Fog Computing
2.4.1 Security Issues
2.4.2 Privacy Issues
2.4.3 Legal Aspects
2.5 Security Challenges in Fog Computing
2.5.1 Identification/Authentication
2.5.2 Systems with Access Controls
2.5.3 Strained Resource Devices
2.5.4 Virtualization
2.5.5 Privacy
2.5.6 Trust
2.5.7 Rules and Network Security
2.5.8 Intrusion Detection System (IDS)
2.5.9 Fog Forensics
3 Security Threat Model for Fog Computing
3.1 Network Framework
3.2 Service Framework
3.2.1 Data Centres at Edge
3.2.2 Core Framework
3.3 Virtualized Framework
3.4 End-Users Devices
4 DDoS Attack in Fog Environment
4.1 Taxonomy
4.2 Motive of Attackers
4.3 Attack Modes
4.4 Types of DDoS Attack
4.4.1 Application-Bug Level DDoS
4.4.2 Infrastructural Level DDoS
4.5 Strategies for Attack
4.6 Tools Used for DDoS Attack
4.6.1 LOIC
4.6.2 Bitnami
4.6.3 Wireshark
4.6.4 Ettercap
5 Defence Mechanism
5.1 The Network
5.2 Access Control
5.3 Intrusion Detection
6 Open Research and Future Work
7 Conclusion
References
21 Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network
1 Introduction
2 Literature Review
3 Big Data
3.1 Predictive Model of Big Data\'s 5V
3.2 Big Data Analytics
3.3 Big Data Security Issues
3.4 Big Data on Cloud System Scenario
4 Internet of Things
4.1 Advantages of the Data
4.2 IoT Data
4.3 Security
4.3.1 Decode-and-Forward (DF)
4.3.2 Amplify-and-Forward (AF)
5 Cloud Computing
5.1 Features
5.2 Security on Cloud Computing
5.3 Cloud Computing Trade-Offs
6 IoT and Cloud Computing Integration
6.1 Security Issues in IoT and Cloud Computing Integration
6.2 Big Data Based on Cloud Server
6.3 Proposed Efficient IoT and Cloud Computing Security Model
6.4 Experimental Results
7 Conclusions
References
22 Heterogeneous-Internet of Vehicles (Het-IoV) in Twenty-First Century: A Comprehensive Study
1 Introduction
1.1 Evolution of Vehicular Paradigm from VANET toward IoV
2 Internet of Vehicles Vital Research and Innovation Motivation
2.1 IoV Architecture and Background
2.1.1 Environment Sensing Layer
2.1.2 Heterogeneous Network Layer
2.1.3 Coordination Control Layer
2.1.4 Application Service Layer
2.2 State-of-Art Technologies for IoV Communication
2.2.1 Intra Vehicle Connectivity or Vehicle to Sensor on Board Communication (V2S)
2.2.2 Inter-Vehicle Connectivity or Vehicle to Vehicle Communication (V2V)
2.2.3 Vehicle to Internet Communication (V2I)
2.2.4 Vehicle to Cloud Communication (V2C)
2.3 Applications of IoV
3 Heterogeneous Vehicular Communication
3.1 V2I Communication
3.1.1 DSRC
3.1.2 Cellular-Het-IoV Communications
3.2 V2V Communication
3.2.1 LTE D2D Communications
3.3 V2X Communication
3.3.1 Vehicular Cloud
4 Open Issues and Future Research Implications
4.1 Open Issues
4.1.1 Issues Related to the Management of Big Data
4.1.2 Other Issues
4.2 Future Prospects
5 Pragmatic Encounters around the World
6 Conclusions
7 Summary
References
23 A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems
1 Introduction
1.1 Novelty of the Research
2 Research Methods
3 Search Strategy
4 Data Synthesis
5 Key Concepts
6 Overview of Research Journal Articles
7 Degree of Article Coverage
8 Findings/Results
9 Discussion
10 Conclusion
References
24 Investigation of Security Issues in Distributed System Monitoring
1 Introduction
1.1 Monitoring Systems
1.1.1 Monitoring Tools
1.1.2 Purpose of Network Monitoring Tools
1.1.3 Features of Network Monitoring Tools
1.1.4 How Network Monitoring Works
1.1.5 Passive Monitoring Framework
1.1.6 Customized Process Monitoring Tool
1.1.7 Secure Monitoring Framework for Distributed System
1.1.8 Network Security Management
1.2 Problems in Monitoring Systems
1.3 Wireshark Monitoring Tool
1.3.1 Purposes of Wireshark
1.3.2 Characteristics of Wireshark
1.3.3 Features Not Present in Wireshark Tool
1.3.4 Why Wireshark Tool?
1.4 Algorithmic Procedure for Monitoring
1.5 Implementation of Application for Message Exchange
1.5.1 USER_Node1 is Sending a Message to USER_Node2
1.5.2 USER_Node2 Received Message from USER_Node1
1.6 Implementation of Monitoring Scenarios Using Wireshark Tool
1.7 Implementation of Secure Way of Monitoring
1.8 Pseudo Code for Secure Transmission and Reception of Messages
2 Secure Way of Monitoring
3 Summary
References
25 An Analysis of Provable Security Frameworks for RFID Security
1 Introduction
2 Existing RFID Security Protocols
2.1 Hash-Based Protocols
2.2 ECC-Based Protocols
2.3 PUF-Based Protocols
2.4 HB Protocols
2.5 Ultra-Lightweight Protocols
3 Provable Security Models
3.1 Vaudeney\'s Model
3.2 Canard et al.\'s Model
3.3 Universal Composability Model
3.4 Juels–Weis Challenge–Response Model
4 Issues With Security Models
5 Conclusion
References
26 Computational Techniques for Real-Time Credit Card Fraud Detection
1 Introduction
1.1 Research Contributions
1.2 Chapter Outline
2 Credit Card Frauds and Detection
2.1 Types of Credit Card Frauds
2.1.1 Obtaining Physical Cards Illegally
2.1.2 Obtaining Card Information Illegally
2.2 Fraud Prevention/Detection System
2.2.1 Heuristics to Identify Fraudulent Transactions
2.2.2 Challenges in Design of Credit Card Fraud Detection System
3 Information Available for Credit Card Fraud Detection
3.1 Labeled Credit Card Transaction Datasets
4 Computational Techniques for Fraud Detection
4.1 Computational Models Based on Supervised Machine Learning
4.2 Computational Models Based on Unsupervised Machine Learning
4.3 Computational Models Based on Nature-Inspired/Biologically Inspired Computing
4.4 Computational Models Based on Other Miscellaneous Approaches
5 Evaluation
5.1 Handling Class Imbalance
5.2 Handling Concept Drift/Adaptability
5.3 Ensuring Real-Time FDS
5.4 Fraud Detection Cost Overheads
5.5 Lack of Domain-Specific Metrics
5.6 Next-Generation Computational Model for Credit Card Fraud Detection
6 Conclusions
References
27 Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective
1 Introduction
2 Sample WSN Industrial Deployments
3 Industrial WSN: Requirements, Applications, and Standards
3.1 IWSN Requirements
3.1.1 Minimal Cost and Compactness
3.1.2 Interoperability
3.1.3 Noise Resistance and Its Coexistence
3.1.4 Energy Consumption
3.1.5 Self-Organizing
3.1.6 Robustness/Fault-Tolerance
3.1.7 Link-Reliability and Low Delay
3.1.8 Service Differentiation
3.1.9 Quality of Service (QoS)
3.1.10 Resource Constraints
3.1.11 Dynamic Topology and Harsh Environments
3.1.12 Scalability
3.1.13 Multiple Source and Multiple Sinks
3.1.14 Predictable Behavior
3.1.15 Application-Specific Protocols
3.1.16 Data Aggregation
3.2 Industrial Applications
3.3 Industrial Standards
4 Reliability Issues Related to the Industrial Domain
5 Sensor Network Security
5.1 Need for Secure IWSNs
5.2 Attacks in IWSNs
6 Medium Access Control
6.1 CSMA vs TDMA
6.2 Design Considerations
6.3 MAC Protocols and Classification
7 Conclusion and Future Works
8 Future Research Trends
References
28 Privacy Preservation of Electronic Health Record: Current Status and Future Direction
1 Introduction
2 Literature Survey
3 Basics of Privacy and Electronic Health Records
3.1 Privacy
3.2 Privacy Threats
3.3 EHR (Electronic Health Records)
3.4 Requirements of Data Privacy in Electronic Health Records
4 Privacy Models and Privacy Techniques
4.1 Privacy-Preserving Data Mining Models and Algorithms
4.1.1 The Randomization Method
4.1.2 The Anonymity Model
4.1.3 Distributed Privacy Preservation
4.2 Privacy Metrics Level and Data Quality
4.3 Privacy Techniques
4.3.1 Algorithms Against Identity Disclosure
5 Data Protection and Privacy Preserving Laws
6 Privacy Application
6.1 Cloud Computing PPDM
6.2 EHR Databases
6.3 Biological Terrorism
6.4 Household Security
6.5 Web Camera Based Surveillance
6.6 The Watch List Problem
6.7 Genomic Privacy
6.8 Location Based Services PPDM
7 Conclusion and Future Directions
References
29 QKD Protocols Security Between Theory and Engineering Implementation
1 Introduction
2 Security Analysis of Quantum Cryptography
2.1 Some Examples of Implementation
2.2 Quantum Cryptography Security Basis
2.2.1 Entanglement
2.2.2 Superposition
2.2.3 No-Cloning Theorem
2.2.4 Quantum Measurement Theory
2.3 QKD Protocols
2.3.1 The Standard BB84 Protocol
2.3.2 BB84 Protocol Security Analysis
2.4 Quantum Hacking Strategies
2.4.1 Theoretical Hacking Strategies Against QKD Protocols
2.4.2 Hacking Strategies in the Engineering Implementation
3 Vulnerabilities of QKD Protocols in the Implementation Scheme
3.1 Analysis of Public Channel Security
3.2 Analysis of Detectors Weaknesses
4 Conclusion
References
30 Survey of Security and Privacy Issues on Biometric System
1 Introduction
2 Literature Review
2.1 GDPR and IT Act
2.2 Difference Between GDPR and IT Act 2000
2.3 Similarity Between GDPR and IT Act 2000
2.4 Related Work
2.5 History of Biometric System
2.6 Existing Authentication Techniques
3 Case Study
3.1 Aadhaar Card
3.2 E-Passport
3.3 Biometric Authentication Process
3.4 The Biometric Threat of E-Passport
3.5 Smart Card
4 Limitation and Future Scope
References
31 A Novel Session Key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics
1 Introduction
1.1 Motivation
1.2 Objectives
1.3 Contribution of the Chapter
1.4 Organization of the Chapter
2 Background
3 Problem Formulation
4 Proposed Methodology
4.1 Feature Extraction from Fingerprint of User A and B
4.2 Cancelable Template Generation
4.2.1 Proposed Algorithm to Generate Cancelable Template
4.2.2 Combined Template Generation
4.2.3 Symmetric Session Key Generation
4.2.4 Shuffle Key Update from Server
5 Experimental Results and Analysis
5.1 Randomness Testing of 128 Bit Final Key with the NIST Statistical Test Suite
5.2 Randomness Testing of Shuffle Key from Server with the NIST Statistical Test Suite
6 Security Analysis
6.1 Privacy of Fingerprints
6.2 Security of 128 Bit Cryptographic Key
6.3 Prevention Against Replay Attack
6.4 Prevention Against Man-in-Middle Attack
6.5 Known Key Attack
6.6 Known Fingerprint Attack
6.7 Known Server Key Attack
7 Comparison with Few ExistingWork
8 Application of the Proposed Protocol in Cloud Scenario
8.1 User Request to Cloud Provider to Data
9 Conclusions
References
32 Trees, Cryptosignatures, and Cyberspace Mobile Agent Interfaces
1 Introduction
2 Computing on Trees
2.1 A Logical View
2.2 Tree Computation
2.3 G-Diagrams for Initial Models
3 Intelligent Languages and Models
3.1 Intelligent Syntax and Agent Language Processing
3.2 Agent Authentication
3.3 Abstract Intelligent Syntax
4 Intelligent Trees
4.1 Embedding Intelligence
4.2 Intelligent Rewrite Models
4.3 Intelligent Rewrite Models
5 Computing on Intelligent Trees
6 Intelligent Game Trees
6.1 Intelligent Game Trees and AND/OR Trees
6.2 Intelligent Game Trees and the WWW
7 Practical Areas
7.1 Basis Soundness
7.2 Structural Soundness
7.3 Mutual Horizontal Soundness
8 New Realistic Areas
9 Concluding Comments
References
33 Permutation–Substitution Based Image Encryption Algorithms Using Pseudorandom Number Generators
1 Preliminaries
2 Image Fundamentals
2.1 Image Structure
2.2 Random Number Generation Fundamentals
3 Proposed Schemes
3.1 Work 1: Pixel Intensity Modification and Pixel Swapping
3.1.1 Stage 1: Varying Color Intensities
3.1.2 Stage 2: Varying Pixel Position
3.2 Work 2: A Novel Self-transforming Image Encryption Algorithm Using Intrinsically Mutating PRNG
3.2.1 Encryption Procedure
3.2.2 Decryption Procedure
4 Experimental Results
4.1 Visual Test
4.2 Histogram Analysis
4.3 Correlation Coefficient Analysis
4.4 Entropy Analysis
4.5 Differential Analysis
4.6 Mean Squared Error
4.7 Peak Signal-to-Noise Ratio
5 Conclusion
34 Recent Trends in Text Steganography with Experimental Study
1 Introduction
2 History of Steganography
3 Text-Based Steganography
3.1 Format-Based Steganography
3.2 Linguistic Steganography
3.3 Other Methods in Text-Based Steganography
4 Recent Trends in Text-Based Steganography
5 Implementation of Text-Based Steganography
6 Conclusion
References
35 Machine Learning Based Intrusion Detection Techniques
1 Introduction
2 Decision Trees
2.1 Conventional Decision Trees
2.2 Soft Decision Trees
2.3 Randomized Soft Decision Tree
2.4 Rough Set Based Decision Tree
3 Ensemble Techniques
3.1 Ensemble of Standard Decision Trees
3.1.1 k-Means + ID3
3.1.2 Limitations of k-Means + ID3
3.1.3 k-Prototype + C4.5
3.2 Ensemble of Randomized Soft Decision Trees
3.3 Ensemble of Rough-Fuzzy Set Based Decision Trees
4 Datasets
5 Experimental Results
5.1 k-Means + ID3 and k-Prototype + C4.5 Results
5.2 Ensemble of Randomized Soft Decision Tree Results
5.3 Ensemble of Rough-Fuzzy Set Based Decision Trees Results
6 Conclusion
References
36 Feature Selection Using a Machine Learning to Classifya Malware
1 Introduction
2 Literature Review
3 Experiment
3.1 Feature Selection Algorithm
3.2 Classifying by the Use of the Lower Feature
4 Discussion
5 Conclusion
References
37 DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection
1 Introduction
2 Background
2.1 Domain Name System (DNS)
2.2 Botnet
2.3 Domain Generation Algorithms (DGAs)
2.4 Domain Name Representation Using Keras Embedding
2.5 Deep Learning Architectures
2.6 Employing Cost-Sensitive Model for Deep Learning Architectures to Handle Multiclass Imbalance Problem
3 Related Works on Domain Generation Algorithms (DGAs) Analysis
4 Description of Data Set
5 Statistical Measures
6 Proposed Architecture: DeepDGA-MINet
7 Experiments, Results, and Observations
8 Conclusion, Future Works, and Discussions
References
38 ABFT: Analytics to Uplift Big Social Events Using Forensic Tools
1 Introduction
1.1 Big Data Analytics and Digital Forensics
2 Aspects of Big Data Analytics
3 Challenges: Big Data Analytics
3.1 Meeting the Requirement for Speed
3.2 Intellection with Data
3.3 Computing Data Quality
3.4 Exhibiting Significant Results
3.5 Transacting with Outliers
4 Big Data Analysis with Parallel Computing
4.1 Hadoop Distributed File System (HDFS) and MapReduce: An Approach Processing Parallel Computing
5 Text Analytics: The Next Genesis of Big Data
5.1 Subject Recognition
5.2 Concept Mining
5.3 Recognizing Context in User Data
5.3.1 Intra-document Information: Utilizing Information Regarding the Words in the Document
5.3.2 Inter-document Information: Utilizing Information Regarding Document
5.4 Type of Context
6 Management of Big Data Analytics with NoSQL Tools
6.1 Limitations of Traditional Databases for Big Data
6.2 Why NoSQL?
6.2.1 Detailed Study About the NoSQL Tool: MongoDB
6.2.2 Why to Employ MongoDB on Data Set
6.2.3 Limitations
6.2.4 Case Study: Healthcare Analysis
7 Big Social Data Correlating Big Events
7.1 Types of Big Social Data
7.2 Classification of Big Social Data Types
8 Conclusion
References
39 HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory
1 Introduction
2 HackIt Tool
3 Experiment
3.1 Experiment Design
3.2 HackIt Task
3.3 Participants
3.4 Procedure
4 Results
5 Discussion
References