ebook img

Handbook Of Computer Networks And Cyber Security: Principles And Paradigms PDF

957 Pages·2020·23.141 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Handbook Of Computer Networks And Cyber Security: Principles And Paradigms

Brij B. Gupta · Gregorio Martinez Perez  Dharma P. Agrawal · Deepak Gupta Editors Handbook of Computer Networks and Cyber Security Principles and Paradigms Handbook of Computer Networks and Cyber Security Brij B. Gupta • Gregorio Martinez Perez Dharma P. Agrawal (cid:129) Deepak Gupta Editors Handbook of Computer Networks and Cyber Security Principles and Paradigms 123 Editors BrijB.Gupta GregorioMartinezPerez DepartmentofComputerEngineering DepartmentofComputerScience NationalInstitute UniversityofMurcia ofTechnologyKurukshetra CatedráticodeUniversidad Kurukshetra,India Murcia,Spain DharmaP.Agrawal DeepakGupta DepartmentofElectricalEngineering LoginRadiusInc. andComputerScience Vancouver,BC,Canada UniversityofCincinnati Cincinnati,USA ISBN978-3-030-22276-5 ISBN978-3-030-22277-2 (eBook) https://doi.org/10.1007/978-3-030-22277-2 ©SpringerNatureSwitzerlandAG2020 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG. Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Dedicatedtomywife,VarshaGupta,and daughter,PrishaGupta,fortheirconstant supportduringthecourseofthishandbook —B.B.Gupta Dedicatedtomywife,Raquel,andson,Izan, fortheirconstantsupportduringthecourse ofthishandbook —GregorioMartinezPerez Dedicatedtomywife,PurnimaAgrawal,for herconstantsupportduringthecourseofthis handbook —DharmaP.Agrawal Dedicatedtomyfamilyfortheirconstant supportduringthecourseofthishandbook —DeepakGupta Preface Computers have become an integrated part of the modern world and are being extensivelyusedforstoringandretrievinginformation.Businessorganizationsare becomingmoreproductiveandefficientwiththeuseofInternet-basedapplications. A significant rise in their use can be seen for personal purposes as they provide speedyandaccuratesolutionforperformingavarietyoftasks. However, the vast amount of data and information that is being stored and communicated among these computing devices is usually of confidential nature whichrequireshigh-endprotectionfromtheadversarialattacks.Cyberattackshave become a crucial concern for the economies across the globe. Hence, it has becomeinevitabletoestablishadequatesecuritymeasurestosafeguardthesensitive informationandsecuritycriticalsystemsandtoidentifyandevaluatetheunderlying factorsinfluencingtheirdevelopment. This handbook contains chapters dealing with different aspects of computer networksandcybersecurity.Theseinclude: (cid:129) Fundamentals,overviews,andtrendsofcomputernetworksandcybersecurity (cid:129) Security and privacy in ad hoc networks, e-services, mobile systems, wireless sensor networks, smart grid and distributed generation systems, social applica- tionsandnetworks,industrialsystems,pervasive/ubiquitouscomputing,ambient intelligence,cloudcomputing,ande-services (cid:129) SecurityandprivacyofroboticsystemsandWebservice (cid:129) Cyberriskandvulnerabilityassessmentforcybercrime (cid:129) Cybercrimeandwarfare (cid:129) Cyberthreatanalysisandmodelling (cid:129) IoTthreatanalysisandmodelling (cid:129) Humanfactorsinsecurityandprivacy (cid:129) Cyberforensictools,techniques,andanalysis (cid:129) Visualanalyticsforcybersecurity (cid:129) Cybersecuritytestbeds,tools,andmethodologies (cid:129) Activeandpassivecyberdefensetechniques (cid:129) Criticalinfrastructureprotection vii viii Preface (cid:129) Intrusiondetectionandprevention (cid:129) Botnetdetectionandmitigation (cid:129) Biometricsecurityandprivacy (cid:129) Humanfactorsinsecurityandprivacy (cid:129) Cybercrimeandwarfare, (cid:129) Cryptography,stenography,andcryptosystems (cid:129) Honeypotsandsecurity (cid:129) Securitypoliciesandaccesscontrol (cid:129) Networksecurityandmanagement (cid:129) Wirelesssecurity (cid:129) Bluetooth,Wi-Fi,WiMAX,andLTEsecurity (cid:129) Infraredcommunicationsecurity (cid:129) Cyberthreats,implications,andtheirdefense (cid:129) Securitystandardsandlaw (cid:129) Securitymodelling Specifically,thishandbookcontainsdiscussiononthefollowing: (cid:129) AnInvestigationStudyofPrivacyPreservationinCloud (cid:129) SecurityFrameworksinMobileCloudComputing (cid:129) LatestQuantitativeSecurityRiskAnalysisModelsforInformationSystemswith RespecttoCloudComputing (cid:129) AckIBE-BasedSecureCloudDataManagementFramework (cid:129) Machine Learning Solution for Security-Cognizant Data Placement on Cloud Platforms (cid:129) Threats Behind Default Configurations of Network Devices: Local Network AttacksandTheirCountermeasures (cid:129) SecurityandPrivacyissuesinWirelessSensorandBodyAreaNetworks (cid:129) SecurityinUnderwaterWirelessSensorNetworks (cid:129) SecurityIssuesinCognitiveRadioAdHocNetworks (cid:129) SecurityandPrivacyinSocialNetworks:DataandStructuralAnonymity (cid:129) SOIFinFETforComputerNetworksandCybersecuritySystems (cid:129) Software-DefinedNetworkingasanInnovativeApproachtoComputerNetworks (cid:129) Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and FutureDirections (cid:129) Survey on DDoS Attacks, Techniques, and Solutions in Software-Defined Net- work (cid:129) Classification of Cooperative Distributed Denial-of-Service (DDoS) Defense Schemes (cid:129) Epidemic Modelling for the Spread of Bots Through DDoS Attack in E- CommerceNetwork (cid:129) PhysicalUnclonableFunctions(puf)-BasedSecurityinIoT:KeyChallengesand Solutions (cid:129) FogComputing:ApplicationsandSecureDataAggregation (cid:129) A Comprehensive Review of Distributed Denial-of-Service (DDoS) Attacks in FogComputingEnvironment Preface ix (cid:129) Secure Machine Learning Scenario from Big Data in Cloud Computing via InternetofThingsNetwork (cid:129) Heterogeneous-Internet of Vehicles (IoV) Communication in the Twenty-First Century:AComprehensiveStudy (cid:129) AReviewonSecurityandPrivacyinMobileSystems (cid:129) Investigation of Security Issues and Promising Solution in Distributed Systems Monitoring (cid:129) AnAnalysisofProvableSecurityFrameworksforRFIDSecurity (cid:129) ComputationalTechniquesforReal-TimeCreditCardFraudDetection (cid:129) SecurityandprivacyinIndustrialSystem (cid:129) Privacy Preservation of Electronic Health Record: Current Status and Future Direction (cid:129) QKDProtocols’SecurityBetweenTheoryandEngineeringImplementation (cid:129) SurveyofSecurityandPrivacyIssuesonBiometricSystem (cid:129) DesignofaFingerprint-BasedSessionKeyGenerationandSecureCommunica- tionEstablishmentProtocol (cid:129) Trees,Cryptosignatures,andCyberspaceMobileAgentInterfaces (cid:129) Permutation-Substitution-Based Image Encryption Algorithms Using Pseudo RandomNumberGenerators (cid:129) RecentTrendsinDocumentAuthenticationUsingTextSteganography (cid:129) MachineLearning-BasedIntrusionDetectionTechniques (cid:129) FeatureSelectionUsingMachineLearningtoClassifyaMalware (cid:129) DeepDGA-MINet: Cost-Sensitive Deep Learning-Based Framework for Han- dlingMulticlassImbalancedDGADetection (cid:129) ABFT:AnalyticstoUpliftBigSocialEventsUsingForensicTools (cid:129) HackIt:AReal-TimeSimulationToolforStudyingReal-WorldCyberattacksin theLaboratory Kurukshetra,India BrijB.Gupta Murcia,Spain GregorioMartinezPerez Cincinnati,OH,USA DharmaP.Agrawal Vancouver,BC,Canada DeepakGupta December2019 Acknowledgment Many people have contributed greatly to this Handbook of Computer Networks and Cyber Security Principles and Paradigms. We, the editors, would like to acknowledgeallofthemfortheirvaluablehelpandgenerousideasinimprovingthe qualityofthishandbook.Withourfeelingsofgratitude,wewouldliketointroduce theminturn.Thefirstmentionistheauthorsandreviewersofeachchapterofthis handbook. Without their outstanding expertise, constructive reviews, and devoted effort, this comprehensive handbook would become something without contents. The second mention is the Springer publisher staff, especially Susan Lagerstrom- Fife, Senior Publishing Editor, and her team for their constant encouragement, continuous assistance, and untiring support. Without their technical support, this handbook would not be completed. The third mention is our family for being the sourceofcontinuouslove,unconditionalsupport,andprayersnotonlyforthiswork but throughout our life. Last but far from least, we express our heartfelt thanks to theAlmightyforbestowingoverusthecouragetofacethecomplexitiesoflifeand completethiswork. xi Contents 1 SecurityFrameworksinMobileCloudComputing .................... 1 ChaitanyaVemulapalli,SanjayKumarMadria,andMarkLinderman 2 An Investigation Study of Privacy Preserving in Cloud ComputingEnvironment .................................................. 43 AhmedM.Manasrah,M.A.Shannaq,andM.A.Nasir 3 Towards New Quantitative Cybersecurity Risk Analysis ModelsforInformationSystems:ACloudComputing CaseStudy................................................................... 63 MounaJouiniandLatifaBenArfaRabai 4 A Novel AckIBE-Based Secure Cloud Data Management Framework.................................................................. 91 DharavathRameshandSyamKumarPasupuleti 5 A Practicable Machine Learning Solution for Security-CognizantDataPlacementonCloudPlatforms.............. 111 RahulVishwanathKale,BharadwajVeeravalli,andXiaoliWang 6 ThreatsBehindDefaultConfigurationsofNetworkDevices: WiredLocalNetworkAttacksandTheirCountermeasures .......... 133 A.Vázquez-Ingelmo,Á.M.Moreno-Montero, andF.J.García-Peñalvo 7 SecurityandPrivacyIssuesinWirelessSensorandBodyArea Networks..................................................................... 173 MoumitaRoy,ChandreyeeChowdhury,andNaumanAslam 8 PreventingSecurityandPrivacyAttacksinWBANs................... 201 AvaniVyasandSujataPal 9 UnderwaterWirelessSensorNetworks.................................. 227 UshaJainandMuzzammilHussain xiii

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.