ebook img

Advanced Smart Computing Technologies in Cybersecurity and Forensics PDF

258 Pages·2021·40.036 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Advanced Smart Computing Technologies in Cybersecurity and Forensics

Advanced Smart Computing Technologies in Cybersecurity and Forensics Advanced Smart Computing Technologies in Cybersecurity and Forensics Edited by Keshav Kaushik Shubham Tayal Akashdeep Bhardwaj Manoj Kumar First edition published 2022 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 and by CRC Press 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN CRC Press is an imprint of Taylor & Francis Group, LLC © 2022 selection and editorial matter, Keshav Kaushik, Shubham Tayal, Akashdeep Bhardwaj, and Manoj Kumar; individual chapters, the contributors Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978- 750-8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Names: Kaushik, Keshav, editor. | Tayal, Shubham, editor. | Bhardwaj, Akashdeep, 1971- editor. | Kumar, Manoj (Professor of computer science), editor. Title: Advanced smart computing technologies in cybersecurity and forensics / edited by Keshav Kaushik, Shubham Tayal, Akashdeep Bhardwaj, and Manoj Kumar. Description: First edition. | Boca Raton : CRC Press, 2022. | Includes bibliographical references and index. | Summary: “This book addresses the topics related to artificial intelligence, internet of things, blockchain technology, and machine learning and brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics”-- Provided by publisher. Identifiers: LCCN 2021036513 (print) | LCCN 2021036514 (ebook) | ISBN 9780367686505 (hardback) | ISBN 9780367690137 (paperback) | ISBN 9781003140023 (ebook) Subjects: LCSH: Computer security. | Computer crimes--Investigation. Classification: LCC QA76.9.A25 A354 2022 (print) | LCC QA76.9.A25 (ebook) | DDC 005.8--dc23/eng/20211007 LC record available at https://lccn.loc.gov/2021036513 LC ebook record available at https://lccn.loc.gov/2021036514 ISBN: 978-0-367-68650-5 (hbk) ISBN: 978-0-367-69013-7 (pbk) ISBN: 978-1-003-14002-3 (ebk) DOI: 10.1201/9781003140023 Typeset in Times by SPi Technologies India Pvt Ltd (Straive) To Those Who Inspired This Book but Will Never Read It! Contents Preface .......................................................................................................................ix Acknowledgements ...................................................................................................xi Editor Biographies ..................................................................................................xiii Contributors .............................................................................................................xv Chapter 1 Detection of Cross-Site Scripting and Phishing Website Vulnerabilities Using Machine Learning .............................................1 J. Charu, S. Sunil, and C. Aarti Chapter 2 A Review: Security and Privacy Defensive Techniques for Cyber Security Using Deep Neural Networks (DNNs) ......................11 Prachi Chauhan, Hardwari Lal Mandoria, and Alok Negi Chapter 3 DNA-Based Cryptosystem for Connected Objects and IoT Security ........................................................................................23 Brahim Belhorma, Mounir Bouhedda, Billel Bengherbia, and Omar Benzineb Chapter 4 A Role of Digital Evidence: Mobile Forensics Data ..........................47 G. Maria Jones, S. Godfrey Winster, and L. Ancy Geoferla Chapter 5 Analysis of Kernel Vulnerabilities Using Machine Learning .............65 Supriya Raheja, Rakesh Garg, and Bhavya Gururani Chapter 6 Cyber Threat Exploitation and Growth during COVID-19 Times .....85 Romil Rawat, Bhagwati Garg, Vinod Mahor, Mukesh Chouhan, Kiran Pachlasiya, and Shrikant Telang Chapter 7 An Overview of the Cybersecurity in Smart Cities in the Modern Digital Age ..........................................................................103 Reinaldo Padilha França, Ana Carolina Borges Monteiro, Rangel Arthur, and Yuzo Iano vii viii Contents Chapter 8 The Fundamentals and Potential for Cyber Security of Machine Learning in the Modern World .........................................................119 Ana Carolina Borges Monteiro, Reinaldo Padilha França, Rangel Arthur, and Yuzo Iano Chapter 9 Qualitative and Quantitative Evaluation of Encryption Algorithms ........................................................................................139 Rakesh Garg, Supriya Raheja, and Durgesh Pandey Chapter 10 Analysis and Investigation of Advanced Malware Forensics ...........153 P. S. Apirajitha, S. Punitha, and Stephan Thompson Chapter 11 Network Intrusion Detection System Using Naïve Bayes Classification Technique for Anomaly Detection .............................167 Sam Goundar, Manveer Singh, Rahul Chand, and Akashdeep Bhardwaj Chapter 12 Data Security Analysis in Mobile Cloud Computing for Cyber Security ..................................................................................189 Sam Goundar and Akashdeep Bhardwaj Chapter 13 A Comprehensive Review of Investigations of Suspects of Cyber Crimes ....................................................................................203 Nehinbe Joshua Ojo Chapter 14 Fault Analysis Techniques in Lightweight Ciphers for IoT Devices .............................................................................................223 Priyanka Joshi and Bodhisatwa Mazumdar Index ......................................................................................................................241 Preface Advanced Smart Computing Technologies in Cybersecurity and Forensics (ASCTCSF) by CRC Press, Taylor & Francis Group, USA is a brainchild of Keshav Kaushik, Dr. Shubham Tayal, Dr. Akashdeep Bhardwaj, and Dr. Manoj Kumar. Advanced practices of cybersecurity and forensics help solve real-life problems and provide solutions to secure user data and help our daily lives, to make the world a better, more secure place. Here we share our ideas in form of a book. Big thanks to all our co-authors, who are experts in their own domains, for sharing their experience and knowledge. This book is an attempt to compile their ideas in the form of chapters to share with the world. This book provides insights into Machine Learning, Artificial Intelligence, and real-time new age domain to supplement Cyber Security Operations, Governance, Compliance, Policies, Risk Management, and VA/ PT. The book also looks at Cybersecurity for Big Data, IoT and Blockchain, and Threat Modeling. The book will be helpful for security professionals, academicians, scientists, advanced-level students, penetration testers, and researchers working in the field of cybersecurity and forensics. ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.