Úplné zobrazení záznamu

Toto je statický export z katalogu ze dne 11.05.2024. Zobrazit aktuální podobu v katalogu.

Bibliografická citace

.
0 (hodnocen0 x )
EB
ONLINE
Cham : Springer International Publishing AG, 2022
1 online resource (267 pages)
Externí odkaz    Plný text PDF 
   * Návod pro vzdálený přístup 


ISBN 9783031040368 (electronic bk.)
ISBN 9783031040351
Lecture Notes in Computer Science Ser. ; v.13300
Print version: Koodziej, Joanna Cybersecurity of Digital Service Chains Cham : Springer International Publishing AG,c2022 ISBN 9783031040351
Intro -- Preface -- Acknowledgements -- Contents -- A Reference Architecture for Management of Security Operations in Digital Service Chains -- 1 Introduction -- 2 Related Work -- 3 The GUARD Framework -- 4 GUARD Platform -- 4.1 Security Analytics Pipelines -- 4.2 Context-Broker Manager -- 4.3 Security Controller -- 4.4 Dashboard -- 5 GUARD Operation -- 5.1 Discovery and Management of Security Capabilities -- 5.2 Identity Management and Access Control -- 5.3 Workflows -- 6 Validation and Performance Analysis -- 6.1 Data Handling Pipeline -- 6.2 Control Abstraction -- 7 Conclusion -- References -- Monitoring Network Flows in Containerized Environments -- 1 Introduction -- 2 Flow Monitoring -- 2.1 Existing Tools and Limitations -- 2.2 The Extended Berkeley Packet Filter -- 2.3 eBPF for Monitoring, Inspection, and Enforcement -- 3 A New Flow Monitoring Tool: bpfFlowMon -- 4 Evaluation -- 4.1 Accuracy -- 4.2 Performance and Overhead -- 5 Limitations of the Proposed Approach -- 6 Related Work -- 7 Conclusion -- References -- Intelligent Transportation Systems - Models, Challenges, Security Aspects -- 1 Introduction -- 2 Intelligent Transportation Models -- 2.1 Examples of the Traffic Flow ITS Models -- 2.2 ICT Supporting Models for Traffic Flow -- 2.3 ITS e-Business Aspects and Models -- 3 Methods of Detection of Anomalies, Attacks and Threats in ICT Systems -- 3.1 Attack Technique and Thread Impact Criteria -- 3.2 Known and Unknown Attacks -- 4 ITS Practical Example - Wobcom Smart City Project with GUARD Support -- 4.1 Security Aspects of ITS Integration with the GUARD Project -- 5 Conclusions -- References -- NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic -- 1 Introduction -- 2 Anomaly Detection with Machine Learning -- 2.1 Machine Learning Methods -- 2.2 Attack Emulation -- 2.3 Adjusting Detection Threshold.
2.4 Ensemble Learning -- 3 The NAD Architecture -- 3.1 Modules -- 3.2 Deployment schemes -- 3.3 Integration with the Real Network Infrastructure -- 4 Experiments -- 4.1 Repeatability -- 4.2 Unknown DoS Detection -- 4.3 Ensemble Models -- 4.4 Threshold Adjustment -- 5 Conclusions -- References -- Detecting Unknown Cyber Security Attacks Through System Behavior Analysis -- 1 Introduction -- 2 Log Data Analysis for Security Purposes -- 3 Incremental Character-Based Event Processing -- 4 Creating Cluster Templates -- 5 Learning Data Structures and Creating Tree-Based Parsers -- 6 System Behavior Modeling and ML-Based Anomaly Detection -- 7 Conclusion -- References -- Signature-Based Detection of Botnet DDoS Attacks -- 1 Introduction -- 2 PGA Signatures -- 2.1 Network Telescope -- 2.2 DDoS Seen Through Network Telescope -- 2.3 Botnets -- 2.4 Packet Generation Algorithm -- 2.5 Generating PGA Signatures -- 3 PGA Filter -- 3.1 Extended Barkeley Packet Filter -- 3.2 PGA Filter Architecture -- 3.3 PGA Filter Integration in the GUARD Framework -- 4 Conclusion -- References -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- 1 Introduction -- 2 Entities and Operations -- 2.1 Overview -- 2.2 Alerts -- 2.3 Alert Groups -- 2.4 Meta-alerts -- 3 Application Example -- 3.1 CTI Process Flow -- 3.2 Data Generation -- 3.3 CTI Dashboard -- 4 Conclusion -- References -- Blockchain-Based Task and Information Management in Computational Cloud Systems -- 1 Introduction -- 2 Blockchain Backgrounds -- 2.1 Blockchain Network -- 2.2 Blockchain Components, Protocols and Algorithms -- 2.3 Consensus Models -- 2.4 Blockchain Taxonomies -- 2.5 Security in BC Networks -- 2.6 Blockchain Usecases -- 3 Security Criterion in Scheduling and Resource Allocation Problems in Computational Clouds.
3.1 Security-Aware Cloud Schedulers - A Short Survey of Recent Schedulers -- 4 Blockchain-Based Secure Cloud Scheduler -- 4.1 Clients and Cloud Service Providers -- 4.2 Pool of Requests -- 4.3 Nodes and Transactions -- 4.4 Chain of Blocks -- 4.5 Proof of Schedule - Generalized Stackelberg Game -- 4.6 Blocks Mining -- 4.7 Profits for Task Schedulers -- 4.8 Evaluation Examples -- 5 Conclusions -- References -- Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them? -- 1 Introduction -- 2 Contemporary Ethical Issues in Cybersecurity -- 2.1 Data Privacy of Users -- 2.2 Security Breaches and Risks. Contemplating the Idea of "Ethical Hacking" -- 2.3 New Risks in Developing Fields - IoT and Cloud Computing -- 2.4 Risks While Testing New Technology -- 3 Required Measures to Ensure Ethical Compliance -- 3.1 Implementing Organisational Measures to Ensure Ethical Compliance -- 3.2 Carrying Out an Impact Assessment -- 3.3 Adopting Privacy Enhancing Technologies -- 4 Conclusions -- References -- A Discussion on Ethical Cybersecurity Issues in Digital Service Chains -- 1 Introduction -- 2 Background and Related Work -- 2.1 Cybersecurity and Information Security -- 2.2 Data Commercialization -- 2.3 Digital Service Chains -- 2.4 Ethics in Cybersecurity -- 2.5 Related Work -- 3 Methodology -- 4 Ethical Issues -- 4.1 Content Creation -- 4.2 Aggregation -- 4.3 Distribution -- 4.4 Data Transport -- 4.5 Digital Experience -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Author Index.
001896884
express
(Au-PeEL)EBL6949311
(MiAaPQ)EBC6949311
(OCoLC)1310782928

Zvolte formát: Standardní formát Katalogizační záznam Zkrácený záznam S textovými návěštími S kódy polí MARC