CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances…mehr
Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals.
Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels.
This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Sabyasachi Pramanik is an assistant professor in the Department of Computer Science and Engineering, Haldia Institute of Technology, India. He earned his PhD in computer science and engineering from the Sri Satya Sai University of Technology and Medical Sciences, Bhopal, India. He has more than 50 publications in various scientific and technical conferences, journals, and online book chapter contributions. He is also serving as the editorial board member on many scholarly journals and has authored one book. He is an editor of various books from a number of publishers, including Scrivener Publishing. Debabrata Samanta, PhD, is an assistant professor in the Department of Computer Science, Christ University, Bangalore, India. He obtained his PhD in from the National Institute of Technology, Durgapur, India, and he is the owner of 20 patents and two copyrights. He has authored or coauthored over 166 research papers in international journals and conferences and has received the "Scholastic Award" at the Second International Conference on Computer Science and IT application in Delhi, India. He is a co-author of 11 books and the co-editor of seven books and has presented various papers at international conferences and received Best Paper awards. He has authored o co-authored 20 Book Chapters. M. Vinay, PhD, obtained his PhD at JJT University Rajasthan for Computer Science and is an assistant professor of computer science at Christ University, Bengaluru, India. With over 14 years of teaching, he has received numerous prestigious teaching awards. He has given more than 30 invited talks, 35 guests lectures and conducted more than 25 workshops, He has also published over a dozen papers in distinguished scholarly journals. Abhijit Guha is pursuing a doctorate with the Department of Data Science, Christ University, India. He is currently working as a research and development scientist with First American India Private Ltd. He received three consecutive "Innovation of the Year" awards, from 2015 to 2017, by First American India for his contribution towards his research.
Inhaltsangabe
Preface xv
Acknowledgments xxiii
1 Securing Cloud-Based Enterprise Applications and Its Data 1 Subhradip Debnath, Aniket Das and Budhaditya Sarkar
1.1 Introduction 2
1.2 Background and Related Works 3
1.3 System Design and Architecture 5
1.3.1 Proposed System Design and Architecture 5
1.3.2 Modules 5
1.3.2.1 Compute Instances 5
1.3.2.2 API Gateway 6
1.3.2.3 Storage Bucket (Amazon S3) 6
1.3.2.4 Lambda 6
1.3.2.5 Load Balancer 6
1.3.2.6 Internet Gateway 6
1.3.2.7 Security Groups 7
1.3.2.8 Autoscaling 7
1.3.2.9 QLDB 7
1.3.2.10 NoSQL Database 8
1.3.2.11 Linux Instance and Networking 8
1.3.2.12 Virtual Network and Subnet Configuration 8
1.4 Methodology 9
1.4.1 Firewall 9
1.4.2 Malware Injection Prevention 9
1.4.3 Man-in-the-Middle Prevention 9
1.4.4 Data at Transit and SSL 9
1.4.5 Data Encryption at Rest 10
1.4.6 Centralized Ledger Database 10
1.4.7 NoSQL Database 10
1.4.8 Linux Instance and Server Side Installations 10
1.5 Performance Analysis 21
1.5.1 Load Balancer 21
1.5.2 Lambda (For Compression of Data) 22
1.5.3 Availability Zone 23
1.5.4 Data in Transit (Encryption) 23
1.5.5 Data in Rest (Encryption) 23
1.6 Future Research Direction 23
1.7 Conclusion 24
References 25
2 High-Performance Computing-Based Scalable "Cloud Forensicsas- a-Service" Readiness Framework Factors--A Review 27 Srinivasa Rao Gundu, Charanarur Panem and S. Satheesh
2.1 Introduction 28
2.2 Aim of the Study 29
2.3 Motivation for the Study 29
2.4 Literature Review 30
2.5 Research Methodology 32
2.6 Testing Environment Plan 32
2.7 Testing 35
2.7.1 Scenario 1: Simultaneous Imaging and Upload and Encryption 36
2.7.2 Scenario 2: Real-Time Stream Processing 41
2.7.3 Scenario 3: Remote Desktop Connection, Performance Test 41
2.8 Recommendations 42
2.9 Limitations of Present Study 42
2.10 Conclusions 43
2.11 Scope for the Future Work 43
Acknowledgements 44
References 44
3 Malware Identification, Analysis and Similarity 47 Subhradip Debnath and Soumyanil Biswas
3.1 Introduction 48
3.1.1 Goals of Malware Analysis and Malware Identification 48
3.1.2 Common Malware Analysis Techniques 49
3.2 Background and Related Works 49
3.3 Proposed System Design Architecture 51
3.3.1 Tool Requirement, System Design, and Architecture 51
3.3.1.1 For Static Malware Analysis 51
3.3.1.2 For Dynamic Malware Analysis 56
3.4 Methodology 62
3.5 Performance Analysis 67
3.6 Future Research Direction 67
3.7 Conclusion 68
References 68
4 Robust Fraud Detection Mechanism 71 Balajee Maram, Veerraju Gampala, Satish Muppidi and T. Daniya
4.1 Introduction 72
4.2 Related Work 76
4.2.1 Blockchain Technology for Online Business 76
4.2.2 Validation and Authentication 79
4.2.3 Types of Online Shopping Fraud 81
4.2.3.1 Software Fraudulent of Online Shopping 81
4.2.4 Segmentation/Authentication 82
4.2.4.1 Secure Transaction Though Segmentation Algorithm 83