You are previewing Improving Information Security Practices through Computational Intelligence.
O'Reilly logo
Improving Information Security Practices through Computational Intelligence

Book Description

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board
  6. Preface
  7. Acknowledgment
  8. Section 1: Introduction
    1. Chapter 1: Computational Intelligence Paradigms
      1. ABSTRACT
      2. INTRODUCTION
      3. NEURAL NETWORKS
      4. EVOLUTIONARY COMPUTATION
      5. SWARM INTELLIGENCE
      6. FUZZY LOGIC
      7. HYBRID SYSTEMS
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
    2. Chapter 2: Computational Intelligence in Cryptology
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW OF CRYPTOLOGY
      4. AUTOMATED DESIGN OF CIPHER SYSTEMS
      5. AUTOMATED CRYPTANALYSIS OF CIPHER SYSTEMS
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
  9. Section 2: Applications of Evolutionary Computation in Cryptology
    1. Chapter 3: Automated Design of Stream Ciphers Using GADS
      1. ABSTRACT
      2. INTRODUCTION
      3. STREAM CIPHER
      4. GENETIC PROGRAMMING
      5. SIMULATED ANNEALING
      6. PROBLEM DEFINITION
      7. FUNCTION AND TERMINAL SET
      8. REPRESENTATION SCHEMA
      9. PROPOSED SYSTEM ARCHITECTURE
      10. STREAM CIPHER DESIGN ALGORITHM
      11. RESULTS
      12. CONCLUSION
      13. REFERENCES
      14. KEY TERMS AND DEFINITIONS
    2. Chapter 4: Chaotic-Based and Biologically Inspired Cryptosystems for Secure Image Communication and Storage
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: CHAOS THEORY
      4. IMAGE CRYPTOSYSTEMS: REVIEW
      5. CASE STUDY
      6. CONCLUSION
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
  10. Section 3: Intelligent Intrusion Detection
    1. Chapter 5: The Conceptual and Architectural Design of an Intelligent Intrusion Detection System
      1. ABSTRACT
      2. INTRODUCTION
      3. TYPES OF ATTACK
      4. INTRUSION DETECTION SYSTEM: AN OVERVIEW
      5. TYPES OF INTRUSION DETECTION SYSTEM
      6. RELATED WORK
      7. ISSUES AND CHALLENGES IN THE CURRENTLY USED IDSs
      8. PROPOSED INTELLIGENT INTRUSION DETECTION SYSTEM
      9. EXPERIMENTATION ENVIRONMENT
      10. EXPERIMENTATION WITH KDDCUP’99 DATASET USING WEKA SIMULATION ENVIRONMENT
      11. COMPARATIVE ASSESSMENT
      12. SCOPE FOR FUTURE WORKS
      13. CONCLUSION
      14. REFERENCES
      15. KEY TERMS AND DEFINITIONS
    2. Chapter 6: Agents for Intrusion Detection in MANET
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. AGENT-BASED IDSs
      5. DISCUSSION
      6. OPEN ISSUES, CHALLENGES, AND SCOPE FOR FUTURE WORK
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
  11. Section 4: Authentication
    1. Chapter 7: Applications of Digital Signature Certificates for Online Information Security
      1. ABSTRACT
      2. INTRODUCTION
      3. INFORMATION SECURITY
      4. INFORMATION SECURITY THROUGH CRYPTOGRAPHY
      5. DIGITAL SIGNATURES CERTIFICATES
      6. TIME STAMPING AND TIME STAMPING SERVICES
      7. APPLICATIONS OF DIGITAL SIGNATURE CERTIFICATES
      8. LEGAL VALIDITY AND GOVERNMENT USE OF DIGITAL SIGNATURES
      9. IMPLEMENTING DIGITAL SIGNATURE CERTIFICATES
      10. RECENT DEVELOPMENTS IN CRYPTOGRAPHY
      11. CONCLUSION
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
    2. Chapter 8: Cryptomodules in Wireless Networks Using Biometric Authentication
      1. ABSTRACT
      2. INTRODUCTION
      3. COMMUNICATION IN SENSOR NETWORK
      4. SECURE HARDWARE IN WIRELESS NETWORK NODES
      5. BIOMETRIC GENERATION OF CRYPTOGRAPHIC KEYS
      6. BIOMETRIC AUTHENTICATION IN WIRELESS NETWORK
      7. FORMAL VERIFICATION
      8. CONCLUSION
      9. ACKNOWLEDGMENT
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
      12. ENDNOTE
  12. Section 5: Multimedia Security
    1. Chapter 9: Improving the Security of Digital Images in Hadamard Transform Domain Using Digital Watermarking
      1. ABSTRACT
      2. INTRODUCTION
      3. REVIEW OF VISIBLE WATERMARKING SCHEMES
      4. REVIEW OF INVISIBLE WATERMARKING SCHEMES
      5. BACKGROUND
      6. DISCRETE HADAMARD TRANSFORM BASED WATERMARKING SCHEMES
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    2. Chapter 10: Computational Aspects of Lattice-Based Cryptography on Graphical Processing Unit
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MULTIPLICATION TECHNIQUES
      5. RESULTS AND COMPARISON
      6. CONCLUSION
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
  13. Compilation of References
  14. About the Contributors