ebook img

Computer and cyber security: principles, algorithm, applications, and perspectives PDF

695 Pages·2019·26.482 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Computer and cyber security: principles, algorithm, applications, and perspectives

Computer and Cyber Security Computer and Cyber Security Principles, Algorithm, Applications, and Perspectives Edited by Dr. Brij B. Gupta National Institute of Technology Kurukshetra, Haryana, India Dr. Dharma P. Agrawal University of Cincinnati, USA Dr. Haoxiang Wang GoPerception Laboratory & Cornell University, USA CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2019 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper International Standard Book Number-13: 978-0-8153-7133-5 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright.com (http:// www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Dedicated to my wife Varsha Gupta for her constant support during the course of this book Brij B. Gupta Dedicated to my wife Purnima Agrawal for her constant support during the course of this book Dharma P. Agrawal Dedicated to my wife Angelia Yao for her constant support during the course of this book Haoxiang Wang Contents Preface .......................................................................................................................................ix Acknowledgements ...................................................................................................................xi Editors ....................................................................................................................................xiii List of Contributors .................................................................................................................xv 1 Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior .........................................................................................................1 ALBERTO HUERTAS CELDRÁN, MANUEL GIL PÉREZ, FÉLIX J. GARCÍA CLEMENTE, AND GREGORIO MARTÍNEZ PÉREZ 2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port .........23 ANDREA CHIAPPETTA 3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk .........................................................................................................45 BAIDYANATH BISWAS AND SUKANYA PATRA 4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse .............................................................................95 SUSHMA DEVI AND MOHD AARIF RATHER 5 A Systematic Review of Attack Graph Generation and Analysis Techniques ...........115 URVASHI GARG, GEETA SIKKA, AND LALIT K. AWASTHI 6 Biometric-Based Authentication in Cloud Computing ............................................147 POONAM SAINI AND AWADHESH KUMAR SINGH 7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETs ....171 KULDEEP SINGH, ANIL KUMAR VERMA, AND PALVI AGGARWAL 8 Security in Wireless LAN (WLAN) and WiMAX Systems ......................................195 SHASHANK GUPTA AND BRIJ B. GUPTA 9 Botnet Behavior and Detection Techniques: A Review ............................................223 AMMAR ALMOMANI, OSAMA M. DORGHAM, MOHAMMAD ALAUTHMAN, MOHAMMED AL-REFAI, AND NAUMAN ASLAM 10 Overview of Smartphone Security: Attack and Defense Techniques .......................249 DIKSHA GOEL AND ANKIT KUMAR JAIN vii viii ◾ Contents 11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues ...281 MUSTAPHA HEDABOU 12 Medical Image Enhancement Techniques: A Survey ................................................305 SONALI MAHARAJAN, SATYA PRAKASH GHRERA, AMIT KUMAR SINGH, AND SIMA SAHU 13 Extraction of Malware IOCs and TTPs Mapping with CoAs ..................................335 SHIZA HASAN, MASOOM ALAM, TANVEER KHAN, NADEEM JAVAID, AND ABID KHAN 14 Implementing a Secure Web-Based Application Using Microsoft SDL ...................355 SWAPNONEEL ROY AND PAVAN S. MUDUNDI 15 Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption .......................................................................................389 LIFANG ZHANG, ZHENG YAN, AND RAIMO KANTOLA 16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms ......................................................425 BRIJ B. GUPTA, HIMANSHU SONI, PANKAJ SIWAN, ANKIT KUMAR, AND SHASHANK GUPTA 17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks .......................455 PARMEET KAUR AND AWADHESH KUMAR SINGH 18 Applications of Digital Signatures in Cryptography ...............................................479 SARVESH TANWAR AND ANIL KUMAR VERMA 19 Credit Scoring Using Birds Swarm Optimization ....................................................509 DAMODAR REDDY EDLA, PEDUNAYAK G, TEJASWINI K, HAREESH K, AND RAMALINGASWAMY CHERUKU 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes ...........................................................................527 SANKHANIL DEY AND RANJAN GHOSH 21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures ..................................................................557 MEGHA QUAMARA AND BRIJ B. GUPTA 22 Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective........................................................................................................591 SOMYA RANJAN SAHOO AND BRIJ B. GUPTA 23 A Compendium of Security Issues in Wireless Sensor Networks ............................607 JASMINDER KAUR SANDHU, ANIL KUMAR VERMA, AND PRASHANT SINGH RANA 24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime ......627 ANUPAMA MISHRA, BRIJ B. GUPTA, AND DEEPAK GUPTA Index ......................................................................................................................................649 Preface Nowadays, computers have become essential and are increasingly being used for storing and retrieving information. It has almost become impossible to imagine a world where people can live without these electronic machines. With the rapid development in the electronics business, a num- ber of inventions have come into picture including laptops, tablets, palmtops, and so forth. These are being used by individuals of different age groups and in almost all business processes because of the significant rise in productivity of the work done and overall efficiency. Vast amounts of data and information in private or public sectors along with the personal information of the individuals are stored over these computers, most of which are highly s ensitive. High dependency on the information systems, applications, and services is a clear sign that organizations are becoming more and more susceptible to security issues. Cyber attacks and com- puter safety have become an important concern as high-end vulnerabilities can endanger econo- mies across the globe. It has become essential to provide adequate security measures to safeguard sensitive information. Thus, awareness about the tools and techniques for securing information has become unavoidable. This book contains chapters dealing with different aspects of computer and cyber security. These include fundamentals, overviews, and trends of computer and cyber security, security and privacy in ad hoc networks, security and privacy in e-services, security and privacy in mobile sys- tems, security and privacy in wireless sensor networks, cyber risk and vulnerability assessment cybercrime, cybercrime and warfare, cyber threat analysis and modeling, human factors in security and privacy, cyber forensic tools, techniques, and analysis, visual analytics for cyber security, cyber security testbeds, tools, and methodologies, security and privacy in smart grid and distributed gen- eration systems, security and privacy in social applications and networks, active and passive cyber defense techniques, critical infrastructure protection, security and privacy in industrial systems, security and privacy in pervasive/ubiquitous computing, intrusion detection and prevention, botnet detection and mitigation, security and privacy of robotic systems, security and privacy in ambient intelligence, biometric security and privacy, security and privacy of web service, security and pri- vacy in cloud computing, human factors in security and privacy, security and privacy in e-services, cybercrime and warfare, cryptography and stenography, security and privacy in cloud computing, honeypots and security, security policies and access control, cryptography and cryptosystems, net- work security and management, wireless security, bluetooth, WiFi, WiMax security, cyber threats, implications, and their defense, security standards and law, and security modeling. Specifically, this book contains discussion on the following topics: ◾ Context-aware systems and how to protect sensitive information and control the network behavior in these systems. ◾ Cyber ports and how they are acting as a challenge in networks across the globe. ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.