You are previewing Handbook of Research on Threat Detection and Countermeasures in Network Security.
O'Reilly logo
Handbook of Research on Threat Detection and Countermeasures in Network Security

Book Description

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. The Handbook of Research on Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Dedication
  6. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  7. Preface
  8. Acknowledgment
  9. Chapter 1: Security Concepts, Developments, and Future Trends
    1. ABSTRACT
    2. INTRODUCTION
    3. BASIC PRINCIPLES IN SECURITY SYSTEM DESIGN
    4. PROTECTION SYSTEM DESIGN
    5. SECURITY APPLICATIONS
    6. SECURITY ALGORITHMS
    7. NEW SECURITY DIRECTIONS
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  10. Chapter 2: Enhance Network Intrusion Detection System by Exploiting BR Algorithm as an Optimal Feature Selection
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. ANALYSIS FOR CRITICAL POINTS IN CURRENT NIDS
    5. PROPOSAL OF WWNIDS
    6. MODERN KDD DATASET (VACCINATE SESSIONS AND FEATURES)
    7. MODERN DATASET PREPROCESSING
    8. CWDS DESCRIPTION
    9. FEATURE SELECTION (PROPOSE BR RANKING METHOD)
    10. WWNIDS CLASSIFIER CONSTRUCTING
    11. EXPERIMENTAL WORK AND RESULTS
    12. CONCLUSION
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  11. Chapter 3: Automatic Intrusion Detection and Secret Multi Agent Preservation Using Authentication Measurement Network Threat
    1. ABSTRACT
    2. INTRODUCTION
    3. NETWORK SECURITY ISSUES
    4. COMPUTER NETWORK SECURITY
    5. APPLICATIONS OF AGENT
    6. AGENT-BASED DEVELOPMENT ENVIRONMENT
    7. CLASSIFICATION OF INTRUSION DETECTION SYSTEM
    8. INTRUSION PREVENTION
    9. AGENT SECURITY
    10. EXAMPLE OF AUTOMATIC INTRUSION DETECTION AND SECRET PRESERVATION MULTI AGENT USING AUTHENTICATION MEASUREMENT NETWORK THREAT
    11. PROPOSED SECURITY MULTI AGENT DISTRIBUTED SYSTEM
    12. CONCLUSION
    13. SUGGESTIONS FOR FUTURE WORKS
    14. REFERENCES
    15. KEY TERMS AND DEFINITIONS
  12. Chapter 4: Real Time Internal Intrusion Detection
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. INTRODUCTION TO THE INTRUSION DETECTION SYSTEM (IDS)
    5. THREAT WEBSITE
    6. PURPOSE OF THE DEVELOPMENT OF THE SENSORS
    7. CONCLUSION
    8. SUGGESTIONS FOR FUTURE WORK
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  13. Chapter 5: Authentication Model for Enterprise Resource Planning Network
    1. ABSTRACT
    2. INTRODUCTION
    3. ERP SYSTEMS AND APPLICATIONS
    4. SECURITY IN ERP
    5. CONCLUSION
    6. REFERENCES
    7. KEY TERMS AND DEFINITIONS
  14. Chapter 6: Cryptographic Hash Function
    1. ABSTRACT
    2. INTRODUCTION
    3. CLASSIFICATION, PROPORITIES, CONSTRUCTIONS, AND ATTACKS OF HASH FUNCTIONS
    4. HASH FUNCTIONS APPLICATIONS
    5. AN OVERVIEW OF A SELECTED HASH FUNCTIONS
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  15. Chapter 7: Crime Profiling System
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. SYNTACTIC ANALYSIS
    5. CRIME PROFILING SYSTEM (CPS)
    6. EXPERIMENTS
    7. EVALUATION
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  16. Chapter 8: Proposals to Win the Battle Against Cyber Crime
    1. ABSTRACT
    2. INTRODUCTION
    3. THE HISTORY OF CYBERCRIME
    4. CLASSIFICATION OF CYBER
    5. CYBER CRIME METHODOLOGY
    6. CYBER CRIME EXISTENCE
    7. CYBER CRIME COMMITING
    8. TYPES OF CYBERCRIME
    9. CYBERCRIME AND THE LAW
    10. THE CYBER SECURITY PROBLEMS
    11. THE PROPOSED SOLUTIONS
    12. THE FUTURE TRENDS
    13. CONCLUSION
    14. REFERENCES
    15. KEY TERMS AND DEFINITIONS
  17. Chapter 9: Cyber Crimes
    1. ABSTRACT
    2. INTRODUCTION
    3. CLASSES OF MAJOR CYBER CRIMES, USED TOOLS AND IMPLICATION
    4. BRIEF DESCRIPTION OF CYBER CRIMES WITH BRIEF REMARKS ABOUT THE DEFENSE MECHANISM
    5. ENGINEERING A CYBER CRIME
    6. CONCLUDING REMARKS
    7. ACKNOWLEDGMENT
    8. REFERENCES
    9. KEY TERM AND DEFINITIONS
  18. Chapter 10: Cyber Space Security Assessment Case Study
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. DATA MINING FRAMEWORKS
    5. DISCUSSION
    6. CYBER TERRORIST ATTACKS
    7. WHEEL SECURITY PROTECTION
    8. ANALYSIS OF THE RESULTS
    9. CONCLUSION
    10. FUTURE WORK
    11. REFRENCES
  19. Chapter 11: Biometric Security
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND OF BIOMETRIC SECURITY
    4. FOCUS OF THE CHAPTER
    5. SOLUTIONS AND RECOMMENDATIONS
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
    8. REFERENCES
    9. ADDITIONAL READING
    10. KEY TERMS AND DEFINITIONS
  20. Chapter 12: Data Hiding Schemes Based on Singular Value Decomposition
    1. ABSTRACT
    2. INTRODUCTION
    3. SINGULAR VALUE DECOMPOSITION (SVD)
    4. DEFINITION OF SVD
    5. COMPUTING SVD
    6. SVD IMAGE PROPERTIES
    7. WATERMARK
    8. WATERMARK PROPERTIES
    9. AUDIO WATERMARK
    10. IMAGE WATERMARKING
    11. VIDEO WATERMARKING
    12. HYBRID SVD
    13. STEGANOGRAPHY
    14. STEGANALYSIS
    15. IMAGE ENCRYPTION
    16. SVD PREVIOUS RESEARCH
    17. CONCLUSION
    18. REFERENCES
    19. ADDITIONAL READING
    20. KEY TERMS AND DEFINITIONS
  21. Chapter 13: Malay Language Text-Based Anti-Spam System Using Neural Network
    1. ABSTRACT
    2. INTRODUCTION
    3. BACK-PROPAGATION NEURAL NETWORK CLASSIFICATION
    4. DATA COLLECTIONS
    5. EVALUATION OF BACK-PROPAGATION NEURAL NETWORK TECHNIQUE
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  22. Chapter 14: Virtualization Technology and Security Challenges
    1. ABSTRACT
    2. INTRODUCTION
    3. SERVER CONSOLIDATION
    4. DESIGN DESCRIPTION
    5. BENEFITS OF VIRTUALIZATION
    6. DRAWBACKS OF VIRTUALIZATION
    7. METHODOLOGY
    8. SETUP VIRTUALIZATION MECHANIZE
    9. IMPLEMENTATION
    10. TESTING AND FINDINGS
    11. CONCLUSION
    12. FUTURE WORKS
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  23. Chapter 15: The Impact of Big Data on Security
    1. ABSTRACT
    2. INTRODUCTION
    3. “BIG DATA” TERM
    4. BIG DATA AND TECHNOLOGY INNOVATION
    5. BIG DATA AND COMMERCIAL VALUE
    6. THE ‘DATA RUSH’
    7. BIG DATA MEANING
    8. OPPORTUNITIES OF BIG DATA RESEARCH
    9. CHALLENGES OF BIG DATA RESEARCH
    10. SAMPLING AND DATA COLLECTION
    11. BIG DATA MEASUREMENT
    12. DATA ANALYSIS AND INFERENCES
    13. INTERPRETATION AND THEORETICAL IMPLICATIONS
    14. THE BIG DATA IN CLOUD COMPUTING
    15. BIG DATA IMPACTS BUSINESS ENTERPRISES
    16. TYPES AND SOURCES OF BIG DATA
    17. THE ROLE OF BIG DATA IN SECURITY
    18. SECURITY AWARENESS IN BIG DATA ENVIROMNEMTS
    19. FUNDAMENTIALS TO IMPROVE SECURITY IN BIG DATA ENVIRONMENTS
    20. BIG DATA SECURITY AND PRIVACY CHALLENGES
    21. SECURITY ISSUES IN BIG DATA
    22. USING BIG DATA FOR BUSINESS RESEARCH
    23. BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT
    24. BIG DATA AND MOBILE PHONES
    25. CONCLUSION
    26. REFERENCES
    27. KEY TERMS AND DEFINITIONS
  24. Chapter 16: 16-Directional Geographical Traceback with Generalization to Three Dimensional Multidirectional Geographical IP Traceback
    1. ABSTRACT
    2. INTRODUCTION
    3. THE MERITS OF DGT SCHEMES
    4. THREE-DIMENSIONAL, MULTI-DIRECTIONAL GEOGRAPHICAL TRACEBACK
    5. DIRECTION RATIO SAMPLING ALGORITHM TRACEBACK BASICS
    6. RESULTS AND DISCUSSION
    7. COMPARISON OF DGT 16 WITH OTHER TRACEBACK SCHEMES
    8. SUMMARY
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  25. Chapter 17: A New Approach in Cloud Computing User Authentication
    1. ABSTRACT
    2. INTRODUCTION
    3. SECURITY ISSUES IN CLOUD COMPUTING
    4. CHARACTERISTICS OF CLOUD COMPUTING
    5. CLOUD COMPUTING SERVICE MODEL (ARCHITECTURAL LAYERS OF CLOUD COMPUTING)
    6. CLOUD COMPUTING DEPLOYMENT MODEL
    7. THE PROPOSED SOLUTION
    8. CONCLUSION
    9. FUTURE DEVELOPMENTS
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  26. Chapter 18: Trust Determination in Wireless Ad Hoc Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. THE NWTD ALGORITHM
    5. IMPLEMENTATION AND SIMULATION ENVIRONMENT
    6. RESULTS AND DISCUSSION
    7. CONCLUSION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  27. Chapter 19: Security in Mobile Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. MOBILE COMPUTING
    4. MOBILE OPERATING SYSTEMS
    5. ANDROID OPERATING SYSTEM
    6. iOS OPERATING SYSTEM
    7. SECURITY ISSUES IN MOBILE COMPUTING
    8. SECURITY IN ANDROID
    9. SECURITY IN iOS
    10. SOLUTIONS AND RECOMMENDATIONS
    11. FUTURE RESEARCH DIRECTIONS
    12. CONCLUSION
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  28. Chapter 20: The Security Impacts on Social Media Platforms
    1. ABSTRACT
    2. INTRODUCTION
    3. TYPES OF SOCIAL MEDIA PLATFORMS
    4. RISKS OF USING THE INTERNET
    5. THE IMPORTANCE OF SOCIAL MEDIA FOR ATTACKERS
    6. WHAT COULD GO WRONG IN SOCIAL MEDIA?
    7. EXAMPLES OF ATTACKING STYLES IN SOCIAL MEDIA
    8. WHY DO ATTACKERS SUCCEEDED IN THEIR ATTACKS?
    9. SOCIAL MEDIA LEGAL CHALLENGES
    10. THE SOCIAL MEDIA SECURITY ENVIRONMENT
    11. GENERAL SECURITY MODEL FOR SOCIAL MEDIA WEB SITES
    12. DATA THAT COULD BE MINED IN SOCIAL MEDIA
    13. POINTS OF ATTACKS IN SOCIAL MEDIA
    14. SECURITY DEFENSES AGAINST ATTACKS
    15. KINDS OF ATTACKS IN SOCIAL MEDIA
    16. REASONS OF ATTACKING SOCIAL MEDIA
    17. SOCIAL MEDIA PROGRAMMING FLAWS
    18. SOCIAL MEDIA SECURITY STRATEGY AND POLICY
    19. SOCIAL MEDIA PRIVACY AND GOVERNMENTS
    20. SOCIAL MEDIA SECURITY NEW TRENDS
    21. BEST PRACTICE
    22. CONCLUSION
    23. RECOMMENDATIONS
    24. REFERENCES
    25. KEY TERMS AND DEFINITIONS
  29. Chapter 21: Security in Digital Images
    1. ABSTRACT
    2. INTRODUCTION
    3. CONCLUSION
    4. REFERENCES
    5. KEY TERMS AND DEFINITIONS
  30. Compilation of References
  31. About the Contributors