You are previewing Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security.
O'Reilly logo
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Book Description

Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Dedication
  6. Preface
    1. REFERENCES
  7. Acknowledgment
  8. Chapter 1: Data Security in Wired and Wireless Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. GOALS OF SECURITY
    4. DATA ENCRYPTION
    5. STREAM CIPHER AND BLOCK CIPHER
    6. CONFUSION AND DIFFUSION
    7. MALLEABILITY
    8. SUBSTITUTION-PERMUTATION NETWORK
    9. ENCRYPTION STANDARDS
    10. WIRELESS STANDARDS
    11. SECURITY ATTACKS
    12. SECURITY IN WMAN (802.16)
    13. CLOUD SECURITY
    14. PRIVACY
    15. THOUGHTS ON SECURITY
    16. RECENT PROPOSALS
    17. SUMMARY
    18. REFERENCES
    19. APPENDIX: ACRONYMS
  9. Chapter 2: A New View of Privacy in Social Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. PROBLEM MODEL AND FORMULATION
    5. KEY OBSERVATIONS
    6. SOLUTION DETAILS
    7. SECURITY ANALYSIS
    8. EVALUATION
    9. CONCLUSION
    10. REFERENCES
  10. Chapter 3: A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer
    1. ABSTRACT
    2. INTRODUCTION
    3. MALWARE
    4. BOTNETS
    5. BOTNET COMMAND AND CONTROL (C&C) MECHANISM
    6. CENTRALISED COMMAND AND CONTROL MECHANISM
    7. DECENTRALISED COMMAND AND CONTROL MECHANISM
    8. DENIAL OF SERVICE AND DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
    9. UNDERLYING CONCEPT OF FLOODING ATTACKS
    10. IMPACT OF DDOS FLOODING ATTACKS AND PAST INCIDENTS
    11. CLASSIFICATIONS OF BOTNET-BASED DDOS FLOODING DDOS ATTACKS
    12. NETWORK-LEVEL DDOS FLOODING ATTACKS
    13. APPLICATION-LEVEL DDOS FLOODING ATTACKS
    14. DETECTION TECHNIQUES
    15. METHODS IMPLEMENTED TO DEFEND AGAINST BOTNET-BASED DDOS FLOODING ATTACKS
    16. METHODS OF DETECTING BOTNET-BASED DDOS ATTACKS
    17. METHODS OF MITIGATING BOTNET-BASED DDOS ATTACKS
    18. CONCLUSION
    19. REFERENCES
  11. Chapter 4: Cyber Risk
    1. ABSTRACT
    2. INTRODUCTION
    3. INFORMATION SECURITY: A GROWING CHALLENGE
    4. CYBER RISK IN THE SECURITIES MARKETS: A FOCUS ON THE FINANCIAL SYSTEM
    5. THE CYBER RISK MANAGEMENT IN DEVELOPED AND EMERGING MARKETS: A SUMMARY
    6. CYBER SECURITY AND CYBER INSURANCE
    7. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  12. Chapter 5: Security in Ad Hoc Network and Computing Paradigms
    1. ABSTRACT
    2. INTRODUCTION
    3. SECURITY ATTACKS: A BACKGROUND
    4. SECURITY IN MOBILE AD HOC NETWORKS
    5. SECURITY IN VEHICULAR AD HOC NETWORKS
    6. SECURITY IN CLOUD COMPUTING
    7. SECURITY ANALYSIS TOOLS
    8. CHAPTER SUMMARY
    9. REFERENCES
    10. ADDITIONAL READING
    11. KEY TERMS AND DEFINITIONS
    12. ENDNOTES
  13. Chapter 6: Audio Stego Intrusion Detection System through Hybrid Neural Tree Model
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. AQM STEGANALYSIS: AN OVERVIEW
    5. PROPOSED NEURAL TREE MODEL
    6. EXPERIMENTAL SETUP
    7. RESULTS AND DISCUSSIONS
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  14. Chapter 7: Introduction of Petri Nets
    1. ABSTRACT
    2. INTRODUCTION
    3. INTRODUCTION OF PETRI NETS
    4. APPLICATION OF PETRI NETS
    5. PETRI NETS BASED CHALLENGES TO SECURITY
    6. CONCLUSION
    7. REFERENCES
  15. Chapter 8: Discovering Periodicity in Network Flows for Security Monitoring
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORK
    4. 3. PRELIMINARIES
    5. 4. CLUSTERING NETWORK FLOWS
    6. 5. EXPERIMENTS
    7. 6. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
    10. ENDNOTES
    11. APPENDIX: DATA CLUSTERING
  16. Chapter 9: Secure and Privacy Preserving Keyword Search over the Large Scale Cloud Data
    1. ABSTRACT
    2. INTRODUCTION
    3. SEARCHABLE ENCRYPTION
    4. RANKED SINGLE KEYWORD SEARCH
    5. MULTI-KEYWORD SEARCH
    6. FUZZY KEYWORD SEARCH
    7. CONJUNCTIVE KEYWORD SEARCH
    8. SIMILARITY KEYWORD SEARCH
    9. ATTRIBUTE BASED KEYWORD SEARCH
    10. CONCLUSION
    11. REFERENCES
  17. Chapter 10: Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
    1. ABSTRACT
    2. 1. INTRODUCTION TO ONLINE SOCIAL NETWORK (OSN)
    3. BACKGROUND ON XSS WORMS
    4. 3. BACKGROUND AND MOTIVATION ON XSS WORMS
    5. 4. EXISTING DEFENSIVE SOLUTIONS FOR OSN AGAINST XSS WORMS
    6. 5. DISCUSSION AND FUTURE SCOPE
    7. 6. CONCLUSION
    8. REFERENCES
    9. ADDITIONAL READING
    10. KEY TERMS:
  18. Chapter 11: Digital Image Watermarking
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. NECESSITY OF WATERMARKING
    4. 3. CHARACTERISTICS OF DIGITAL WATERMARKS
    5. 4. CLASSIFICATIONS OF WATERMARKS
    6. 5. SPATIAL DOMAIN TECHNIQUES
    7. 6. TRANSFORM DOMAIN TECHNIQUES
    8. 7. GENERAL FRAMEWORK FOR WATERMARKING
    9. 8. TYPES OF WATERMARKING SYSTEM
    10. 9. APPLICATIONS OF DIGITAL WATERMARKS
    11. 10. WATERMARKING ATTACKS
    12. 11. PERFORMANCE MEASURES
    13. 12. WORK BASED ON DISCRETE WAVELET TRANSFORM
    14. 13. CONCLUSION
    15. REFERENCES
  19. Chapter 12: Security Issues and Countermeasures of Online Transaction in E-Commerce
    1. ABSTRACT
    2. INTRODUCTION TO E-COMMERCE
    3. INTRODUCTION TO ONLINE TRANSACTION IN E-COMMERCE CYCLE
    4. RELATED WORK
    5. SECURITY IN ONLINE TRANSACTION
    6. SECURITY REQUIREMENT
    7. SECURITY ISSUES IN ONLINE TRANSACTION
    8. COUNTER MEASURES AND SOME SOLUTIONS AGAINST THE ATTACK OVER E-COMMERCE WHILE DOING TRANSACTIONS
    9. STEPS OF DOING SECURE TRANSACTION OF DOING PAYMENT BETWEEN CUSTOMER, MERCHANT, AND BANK
    10. CONCLUSION
    11. REFRENCES
    12. ADDITIONAL READING
    13. APPENDIX
  20. Chapter 13: Securing the Human Cloud
    1. ABSTRACT
    2. INTRODUCTION
    3. SECURITY AND PRIVACY ISSUES
    4. SECURITY AND PRIVACY REQUIREMENTS IN WEARABLE DEVICES
    5. CLASSIFICATION OF BIOMETRICS
    6. CHECK-LIST FOR COMPARISON
    7. BIOMETRIC SCHEMES FOR WEARABLE DEVICES
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  21. Chapter 14: Provable Security for Public Key Cryptosystems
    1. ABSTRACT
    2. INTRODUCTION
    3. PUBLIC KEY CRYPTOGRAPHY
    4. FORMAL SECURITY MODELS
    5. EXAMPLE OF PUBLIC KEY ENCRYPTION SCHEME
    6. EXAMPLE OF SIGNATURE SCHEME
    7. SECURITY ANALYSIS OF ABOVE SIGNATURE SCHEME
    8. EXAMPLE OF EXACT SECURITY OF A CRYPTOSYSTEM
    9. SECURITY ANALYSIS OF ABOVE SIGNATURE SCHEME
    10. EXAMPLE OF GENERIC GROUP MODEL
    11. PROVING THE -SDH ASSUMPTION IN GENERIC GROUP MODEL
    12. CONCLUSION
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  22. Chapter 15: Secure Key Establishment in Wireless Sensor Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. INTRODUCTION TO WIRELESS SENSOR NETWORKS
    5. KEY MANAGEMENT
    6. KEY MANAGEMENT IN WSN
    7. SYMMETRIC KEY MANAGEMENT IN WSN
    8. ASYMMETRIC KEY MANAGEMENT IN WSN
    9. CONCLUSION
    10. REFERENCES
  23. Chapter 16: Threats Classification
    1. ABSTRACT
    2. INTRODUCTION
    3. 1. SECURITY THREATS CLASSIFICATION
    4. 2. CLASSIFICATION METHODS BASED ON ATTACKS TECHNIQUES
    5. 3. CLASSIFICATION METHODS BASED ON THREATS IMPACTS
    6. 4. EXISTING THREATS CLASSIFICATION LIMITS
    7. CONCLUSION
    8. REFERENCES
  24. Chapter 17: Analysis of Various Security Issues and Challenges in Cloud Computing Environment
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. PRELIMINARY
    4. 3. BARRIERS, SECURITY ISSUES, AND THREATS
    5. 4. SECURITY CHALLENGES
    6. 5. CURRENT ISSUES AND DISCUSSION
    7. 6. CONCLUSION
    8. REFERENCES
  25. Chapter 18: Review of Link Structure Based Ranking Algorithms and Hanging Pages
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. LINK STRUCTURE BASED RANKING ALGORITHMS
    5. HANGING PAGES
    6. WEB SPAM
    7. WEBSITE OPTIMIZATION
    8. MARKOV CHAIN
    9. SIMULATION AND EXPERIMENT RESULTS
    10. CONCLUSION
    11. REFERENCES
    12. ENDNOTES
  26. Chapter 19: Application of Face Recognition Techniques in Video for Biometric Security
    1. ABSTRACT
    2. INTRODUCTION
    3. FACE RECOGNITION SYSTEM
    4. FACE DETECTION
    5. SOME FACE DETECTION APPROACHES
    6. FACE TRACKING
    7. FEATURE EXTRACTION
    8. FACE RECOGNITION
    9. CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  27. Chapter 20: Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. SECURITY MODELS
    4. CONCLUSION
    5. REFERENCES
    6. ADDITIONAL READING
    7. KEY TERMS AND DEFINITIONS
  28. Chapter 21: DNA Sequence Based Cryptographic Solution for Secure Image Transmission
    1. ABSTRACT
    2. INTRODUCTION
    3. DNA COMPUTING
    4. HYBRID ENCRYPTION SCHEME
    5. CONCLUSION
    6. REFERENCES
  29. Compilation of References
  30. About the Contributors