Cyber Security and Network Security
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Группа авторов. Cyber Security and Network Security
Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Cyber Security and Network Security
Dedication
Preface
Acknowledgments
1. Securing Cloud-Based Enterprise Applications and Its Data
Abstract
1.1 Introduction
1.2 Background and Related Works
1.3 System Design and Architecture. 1.3.1 Proposed System Design and Architecture
1.3.2 Modules. 1.3.2.1 Compute Instances
1.3.2.2 API Gateway
1.3.2.3 Storage Bucket (Amazon S3)
1.3.2.4 Lambda
1.3.2.5 Load Balancer
1.3.2.6 Internet Gateway
1.3.2.7 Security Groups
1.3.2.8 Autoscaling
1.3.2.9 QLDB
1.3.2.10 NoSQL Database
1.3.2.11 Linux Instance and Networking
1.3.2.12 Virtual Network and Subnet Configuration
1.4 Methodology. 1.4.1 Firewall
1.4.2 Malware Injection Prevention
1.4.3 Man-in-the-Middle Prevention
1.4.4 Data at Transit and SSL
1.4.5 Data Encryption at Rest
1.4.6 Centralized Ledger Database
1.4.7 NoSQL Database
1.4.8 Linux Instance and Server Side Installations
1.5 Performance Analysis. 1.5.1 Load Balancer
1.5.2 Lambda (For Compression of Data)
1.5.3 Availability Zone
1.5.4 Data in Transit (Encryption)
1.5.5 Data in Rest (Encryption)
1.6 Future Research Direction
1.7 Conclusion
References
2. High-Performance Computing-Based Scalable “Cloud Forensics-as-a-Service” Readiness Framework Factors—A Review
Abstract
2.1 Introduction
2.2 Aim of the Study
2.3 Motivation for the Study
2.4 Literature Review
2.5 Research Methodology
2.6 Testing Environment Plan
2.7 Testing
2.7.1 Scenario 1: Simultaneous Imaging and Upload and Encryption
2.7.2 Scenario 2: Real-Time Stream Processing
2.7.3 Scenario 3: Remote Desktop Connection, Performance Test
2.8 Recommendations
2.9 Limitations of Present Study
2.10 Conclusions
2.11 Scope for the Future Work
Acknowledgements
References
3. Malware Identification, Analysis and Similarity
Abstract
3.1 Introduction
3.1.1 Goals of Malware Analysis and Malware Identification
3.1.2 Common Malware Analysis Techniques
3.2 Background and Related Works
3.3 Proposed System Design Architecture. 3.3.1 Tool Requirement, System Design, and Architecture. 3.3.1.1 For Static Malware Analysis
3.3.1.2 For Dynamic Malware Analysis
3.4 Methodology
3.5 Performance Analysis
3.6 Future Research Direction
3.7 Conclusion
References
4. Robust Fraud Detection Mechanism
Abstract
4.1 Introduction
4.2 Related Work
4.2.1 Blockchain Technology for Online Business
Algorithm 4.1
4.2.2 Validation and Authentication
4.2.3 Types of Online Shopping Fraud
4.2.3.1 Software Fraudulent of Online Shopping
4.2.4 Segmentation/Authentication
4.2.4.1 Secure Transaction Though Segmentation Algorithm
4.2.4.2 Critical Path Segmentation Optimization
4.2.5 Role of Blockchain Technology for Supply Chain and Logistics
4.3 Conclusion
References
5. Blockchain-Based Identity Management Systems
Abstract
5.1 Introduction
5.2 Preliminaries. 5.2.1 Identity Management Systems
5.2.1.1 Identity Factors
5.2.1.2 Architecture of Identity Management Systems
5.2.1.3 Types of Identity Management Systems
5.2.1.4 Importance of Identity Management Systems
5.2.2 Blockchain
5.2.2.1 Blockchain Architecture
5.2.2.2 Components of Blockchain Architecture
5.2.2.3 Merkle Tree
5.2.2.4 Consensus Algorithm
5.2.2.5 Types of Blockchain Architecture
5.2.3 Challenges
5.3 Blockchain-Based Identity Management System. 5.3.1 Need for Blockchain-Based Identity Management Systems
5.3.2 Approaches for Blockchain-Based Identity Management Systems
5.3.3 Blockchain-Based Identity Management System Implementations
5.3.4 Impact of Using Blockchain-Based Identity Management on Business and Users
5.3.5 Various Use Cases of Blockchain Identity Management
5.4 Discussion
5.4.1 Challenges Related to Identity
5.4.2 Cost Implications
5.5 Conclusion
5.6 Future Scope
References
6. Insights Into Deep Steganography: A Study of Steganography Automation and Trends
Abstract
6.1 Introduction
6.2 Convolution Network Learning
6.2.1 CNN Issues
6.3 Recurrent Neural Networks
6.3.1 RNN Forward Propagation
6.4 Long Short-Term Memory Networks
6.4.1 LSTM Issues
6.5 Back Propagation in Neural Networks
6.6 Literature Survey on Neural Networks in Steganography
6.6.1 TS-RNN: Text Steganalysis Based on Recurrent Neural Networks
6.6.2 Generative Text Steganography Based on LSTM Network and Attention Mechanism with Keywords
6.6.3 Graph-Stega: Semantic Controllable Steganographic Text Generation Guided by Knowledge Graph
6.6.4 RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model
6.6.5 Steganalysis and Payload Estimation of Embedding in Pixel Differences Using Neural Networks
6.6.6 Reversible Data Hiding Using Multilayer Perceptron–Based Pixel Prediction
6.6.7 Neural Network–Based Steganography Algorithm for Still Images
6.7 Optimization Algorithms in Neural Networks
6.7.1 Gradient Descent
6.7.1.1 GD Issues
6.7.2 Stochastic Gradient Descent
6.7.2.1 SGD Issues
6.7.3 SGD with Momentum
6.7.4 Mini Batch SGD
6.7.4.1 Mini Batch SGD Issues
6.7.5 Adaptive Gradient Algorithm
6.8 Conclusion
References
7. Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System
Abstract
7.1 Introduction
7.2 Problem Formulation
7.3 Proposed Mechanism
7.4 Experimental Results
7.5 Future Scope
7.6 Conclusion
References
8. Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission
Abstract
8.1 Introduction
8.2 Review of Literature
8.3 Methodology Used
8.4 Results and Discussion
8.5 Conclusions
References
9. Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN)
Abstract
9.1 Introduction
9.2 Overview of 5G
9.3 Key Enabling Techniques for 5G
9.4 5G Green Network
9.5 5G Technologies: Security and Privacy Issues
9.5.1 5G Security Architecture
9.5.2 Deployment Security in 5G Green Network
9.5.3 Protection of Data Integrity
9.5.4 Artificial Intelligence
9.6 5G-GN Assets and Threats
9.7 5G-GN Security Strategies and Deployments
9.8 Risk Analysis of 5G Applications
9.9 Countermeasures Against Security and Privacy Risks
9.9.1 Enhanced Mobile Broadband
9.9.2 Ultra-Reliable Low Latency Communications
9.10 Protecting 5G Green Networks Against Attacks
9.11 Future Challenges
9.12 Conclusion
References
10. A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology
Abstract
10.1 Introduction
10.2 Literature Survey
10.2.1 Virtualization
10.3 Problem Statement
10.3.1 VMware Workstation
10.4 Green it Using Virtualization
10.5 Proposed Work
10.5.1 Proposed Secure Virtual Framework
10.6 Conclusion
Acknowledgments
References
11. Big Data Architecture for Network Security
Abstract
11.1 Introduction to Big Data
11.1.1 10 V’s of Big-Data
11.1.2 Architecture of Big Data
11.1.3 Big Data Access Control
11.1.4 Classification of Big Data
11.1.4.1 Structured Data
11.1.4.2 Unstructured Data
11.1.4.3 Semi-Structured Data
11.1.5 Need of Big Data
11.1.6 Challenges to Big Data Management
11.1.7 Big Data Hadoop
11.1.8 Big Data Hadoop Architecture
11.1.9 Security Factors
11.1.10 Performance Factors
11.1.11 Security Threats
11.1.12 Big Data Security Threats
11.1.13 Distributed Data
11.1.14 Non-Relational Databases
11.1.15 Endpoint Vulnerabilities
11.1.16 Data Mining Solutions
11.1.17 Access Controls
11.1.18 Motivation
11.1.19 Importance and Relevance of the Study
11.1.20 Background History
11.1.21 Research Gaps
11.2 Technology Used to Big Data
11.2.1 MATLAB
11.2.2 Characteristics of MATLAB
11.2.3 Research Objectives
11.2.4 Methodology
11.3 Working Process of Techniques
11.3.1 File Splitter
11.3.2 GUI Interface for Client
11.3.3 GUI Interface for Server
11.3.4 Encrypted File
11.4 Proposed Work. 11.4.1 Working
11.4.2 Process Flow of Proposed Work
11.4.3 Proposed Model
11.5 Comparative Analysis. 11.5.1 Time Comparison
11.5.2 Error Rate Comparison
11.5.3 Packet Size Comparison
11.5.4 Packet Affected Due to Attack
11.6 Conclusion and Future Scope. 11.6.1 Conclusion
11.6.2 Future Scope
References
About the Editors
Index
Also of Interest
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
Scrivener Publishing
.....
Here, it shows the profile of the employee in the organization from where he/she can view the profile, get necessary updates (i.e., from Announcements, Inbox), and perform the job. From the Home or My Dashboard page, employees see the announcements, small synopsis of unread or latest mail. On clicking over the object storage, it will be redirected to storage or bucket page. From the navigation dashboard, employees can go to any page (only eligible pages) according to their choice. Apart from all these, users can also logout from the page by clicking on the Logout button at bottom right of the page. For the users to store object-based files, the users are authenticated and the client side of the software verifies the file and compresses it after encrypting. Here, we use double layer security, i.e., for the first layer we have used the DES encryption, over that a second layer of encryption, i.e., AES is applied over it. Further, encrypted compressed objects are sent over the public internet and are in a S3 bucket through the REST API that is put in place. After a new object is created over in the primary S3 Bucket, a serverless lambda function gets invoked and the encrypted compressed file is decompressed and decrypted accordingly. Further, after a series of actions verifying the authenticity of the file sent, the file is compressed and stored in another S3 Bucket from where it would be retrieved when required. A life cycle policy is put in place where the older objects which are not required frequently are transferred to an economical tier, and the other much older objects are transferred over to glacier object storages for archival purposes. Figure 1.4 shows inbox page from manager’s point of view.
.....