You are previewing Network Security Technologies.
O'Reilly logo
Network Security Technologies

Book Description

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
  6. Preface
  7. Chapter 1: Review of Security in VANETs and MANETs
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. MOBILE WIRELESS AD HOC NETWORKS (MANETS)
    4. 3. VEHICULAR AD HOC NETWORKS (VANETS)
    5. 4. SECURITY CHALLENGES FOR VANETS AND MANETS
    6. 5. SECURITY REQUIREMENTS
    7. 6. SECURITY ATTACKS
    8. 7. SECURITY MECHANISMS
    9. 8. CRYPTOGRAPHIC BACKGROUND
    10. 9. STATE OF THE ART
    11. 10. SUMMARY
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
  8. Chapter 2: Trends in Crime Toolkit Development
    1. ABSTRACT
    2. INTRODUCTION
    3. THE EVOLUTION OF MALWARE SOFTWARE DEVELOPMENT KITS
    4. CRIME TOOLKITS TRENDS
    5. EXISTING PROTECTION MECHANISM
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  9. Chapter 3: Synthesis of Supervised Approaches for Intrusion Detection Systems
    1. ABSTRACT
    2. INTRODUCTION AND PROBLEMATIC
    3. STATE OF THE ART
    4. EXPERIMENTATION AND RESULTS
    5. RESULTS
    6. CONCLUSION AND PERSPECTIVES
    7. REFERENCES
  10. Chapter 4: Applying Game Theory in Securing Wireless Sensor Networks by Minimizing Battery Usage
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. GAME FORMULATION
    4. 3. CONFIGURATIONS
    5. 4. PERFORMANCE EVALUATION
    6. ACKNOWLEDGMENT
    7. REFERENCES
  11. Chapter 5: Short-Hops vs. Long-Hops
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORKS
    4. PROPAGATION MODEL
    5. SHORT-HOPS VS. LONG-HOPS ANALYSIS
    6. SHORT-HOPS VS. LONG-HOPS COMPARAISON
    7. SIMULATION AND RESULTS VALIDATION
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  12. Chapter 6: HTTPV
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. METHODOLOGY
    4. 3. PERFORMANCE
    5. 4. RELATED WORK
    6. 5. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  13. Chapter 7: Amelioration of Anonymity Modus Operandi for Privacy Preserving Data Publishing
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. IMPETUS FOR PPDP
    4. 3. PRIVACY-PRESERVING DATA PUBLISHING (PPDP)
    5. 4. THE ANONYMIZATION APPROACH
    6. 5. RELATED WORK
    7. 6. ARCHITECTURE OF THE PROPOSED SYSTEM
    8. 7. EVALUATION AND EXPERIMENTAL RESULTS
    9. 8. CONCLUSION AND FUTURE WORK
    10. REFERENCES
  14. Chapter 8: Web Service Security
    1. ABSTRACT
    2. INTRODUCTION
    3. MECHANISMS TO ENSURE SECURITY AT WEB SERVICES
    4. FUTURE RESEARCH DIRECTIONS
    5. CONCLUSION
    6. REFERENCES
  15. Chapter 9: Identity-Based Encryption Protocol for Privacy and Authentication in Wireless Networks
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. LITERATURE REVIEW
    4. 3. PROTOCOL DESIGN
    5. 4. PROTOCOL ANALYSIS
    6. 5. CONCLUSION
    7. REFERENCES
  16. Chapter 10: Distinguishing Human Users from Bots
    1. ABSTRACT
    2. INTRODUCTION
    3. CAPTCHA METHODS
    4. OCR-BASED METHODS
    5. VISUAL NON-OCR-BASED METHODS
    6. NON VISUAL METHODS
    7. CAPTCHA METHODS FOR DISABLED PEOPLE
    8. ASSESSING CAPTCHA METHODS
    9. CONCLUSION AND FURTHER RESEARCHES
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  17. Chapter 11: Network Security
    1. ABSTRACT
    2. INTRODUCTION TO COMPUTER NETWORKS
    3. CLASSICAL NETWORK SECURITY ATTACKS
    4. NETWORK SECURITY CONTROLS
    5. CONCLUSION
    6. ACKNOWLEDGMENT
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  18. Chapter 12: Botnets
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BOTNET OVERVIEW
    4. 3. STATE-OF-THE-ART
    5. REFERENCES
  19. Chapter 13: Formal Reliability Analysis of Engineering Systems
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. PROBABILITY DISTRIBUTION PROPERTIES OF MULTIPLE RANDOM VARIABLES
    4. 3. RELIABILITY ANALYSIS OF COMPLEX SYSTEMS
    5. 4. AUTOMOBILE TRANSMISSION
    6. 5. CONCLUSION
    7. REFERENCES
  20. Chapter 14: Adaptive Intrusion Detection Systems
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. GENERALITIES AND BASIC CONCEPTS
    4. 3. FIRST GENERATION OF IDSS: CLASSICAL IDSS
    5. 4. SECOND GENERATION OF IDSS: DATA MINING BASED IDSS
    6. 5. VALIDATION OF INTRUSION DETECTION APPROACHES
    7. 6. THE CHALLENGING PROBLEM OF DETECTING NEW ATTACKS
    8. 7. THE REQUIREMENT OF ADAPTABILITY IN INTRUSION DETECTION
    9. 8. PRESENTATION AND EVALUATION OF THE EXISTING EMINENT ADAPTIVE INTRUSION DETECTION APPROACHES
    10. 9. NEW TRENDS FOR ADAPTIVE INTRUSION DETECTION SYSTEMS
    11. 10. CONCLUSION
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
  21. Related References
  22. Compilation of References
  23. About the Contributors