ebook img

Advances in Cyber Security and Intelligent Analytics PDF

310 Pages·2022·14.766 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Advances in Cyber Security and Intelligent Analytics

Advances in Cyber Security and Intelligent Analytics We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyber security. We have witnessed the development of various networking models—IoT, SDN, and ICN—to support modern systems requirements. However, they are undergo- ing rapid changes and need special attention. The main issue faced by these paradigms is that traditional solutions cannot be directly applied to address the challenges. Therefore, there is a significant need to develop improved network management and cyber security solutions. To this end, this book highlights the challenges faced by emerging paradigms and presents the recent developments made to address the challenges. More specifically, it presents a detailed study on security issues in distributed computing envi- ronments and their possible solutions, followed by applications of medical IoT, deep learning, IoV, healthcare, etc. Advances in Cyber Security and Intelligent Analytics Edited by Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, and Valentina Emilia Balas First edition published 2023 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 and by CRC Press 4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN CRC Press is an imprint of Taylor & Francis Group, LLC © 2023 selection and editorial matter, Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh and Valentina Emilia Balas; individual chapters, the contributors Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact mpkbookspermissions@ tandf.co.uk Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Names: Verma, Abhishek, editor. Title: Advances in cyber security and intelligent analytics / editors, Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, and Valentina E. Balas. Description: First edition. | Boca Raton : CRC Press, 2023. | Includes bibliographical references and index. Identifiers: LCCN 2022033769 (print) | LCCN 2022033770 (ebook) | ISBN 9781032216003 (hardback) | ISBN 9781032216010 (paperback) | ISBN 9781003269144 (ebook) Subjects: LCSH: Computer networks--Security measures. | Internet--Security measures. | Electronic data processing--Distriuted processing. | Computer security--Technologial innovations. Classification: LCC TK5105.59 .A38226 2023 (print) | LCC TK5105.59 (ebook) | DDC 005.8--dc23/eng/20221017 LC record available at https://lccn.loc.gov/2022033769 LC ebook record available at https://lccn.loc.gov/2022033770 ISBN: 978-1-032-21600-3 (hbk) ISBN: 978-1-032-21601-0 (pbk) ISBN: 978-1-003-26914-4 (ebk) DOI: 10.1201/9781003269144 Typeset in Sabon by KnowledgeWorks Global Ltd. Contents Acknowledgements ix Editors xi Contributors xv 1 Edge computing-enabled secure information-centric networking: Privacy challenges, benefits, and future trends 1 KAVISH TOMAR, SARISHMA DANGI, AND SACHIN SHARMA 2 Weighted attack graphs and behavioral cyber game theory for cyber risk quantification 27 FLORIAN K. KAISER, MARCUS WIENS, AND FRANK SCHULTMANN 3 NetFlow-based botnet detection in IoT edge environment using ensemble gradient boosting machine learning framework 43 D. SANTHADEVI AND B. JANET 4 Exploring the possibility of blockchain and smart contract-based digital certificate 63 P. RAVI KUMAR, P. HERBERT RAJ, AND SHARUL TAJUDDIN 5 Senso Scale: A framework to preserve privacy over cloud using sensitivity range 79 NIHARIKA SINGH, ISHU GUPTA, AND ASHUTOSH KUMAR SINGH 6 Addressing the cybersecurity issues in cloud computing 105 SHIVANSHU OLIYHAN AND CHANDRASHEKHAR AZAD v vi Contents 7 Role of medical image encryption algorithms in cloud platform for teleradiology applications 115 SIJU JOHN AND S. N. KUMAR 8 Machine-learning approach for detecting cyberattacks in Medical Internet of Things 129 THULASI M. SANTHI AND M. C. HELEN MARY 9 Secure IoV-enabled systems at Fog Computing: Layout, security, and optimization algorithms and open issues 141 ANSHU DEVI, RAMESH KAIT, AND VIRENDER RANGA 10 A capability maturity model and value judgment systems for a distributed network of ethical and context aware digital twin agents 151 MEZZOUR GHITA, BENHADOU SIHAM, MEDROMI HICHAM, AND GRIGUER HAFID 11 A detailed cram on artificial intelligence industrial systems 4.0 189 P. DHARANYADEVI, R. SRI SAIPRIYA, T. C. ADITYAA, B. SENTHILNAYAKI, M. JULIE THERESE, A. DEVI, AND K. VENKATALAKSHMI 12 Ensuring liveliness property in safety-critical systems 207 ANKUR MAURYA, SHARAD NIGAM, AND DIVYA KUMAR 13 Machine learning for intelligent analytics 219 JYOTI POKHARIYA, PANKAJ KUMAR MISHRA, AND JYOTI KANDPAL 14 Secure 3D route optimization of combat vehicles in war field using IoV 235 ALOK NATH PANDEY, PIYUSH AGARWAL, AND SACHIN SHARMA 15 Healthcare therapy for treating teenagers with internet addiction using behavioral patterns and neuro-feedback analysis 249 B. DHANALAKSHMI, K. SELVAKUMAR, AND L. SAI RAMESH Contents vii 16 Containerization in cloud computing for OS-level virtualization 261 MANOJ KUMAR PATRA, BIBHUDATTA SAHOO, AND ASHOK KUMAR TURUK 17 An adaptive deep learning approach for stock price forecasting 277 RESHMA MO, JITENDRA KUMAR, AND ABHISHEK VERMA Index 289 Acknowledgements We express our heartfelt gratitude to CRC Press (Taylor & Francis Group) and the editorial team for their guidance and support during the comple- tion of this book. We are sincerely grateful to reviewers for their suggestions and illuminating views for each book chapter presented here in Advances in Cyber Security and Intelligent Analytics. ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.