Cybersecurity in Emerging Digital Era: First International Conference, ICCEDE 2020
- Length: 179 pages
- Edition: 1
- Language: English
- Publisher: Springer
- Publication Date: 2021-08-14
- ISBN-10: 3030848418
- ISBN-13: 9783030848415
- Sales Rank: #0 (See Top 100 Books)
This book constitutes selected and revised papers from the First International Conference on Cybersecurity in Emerging Digital Era, ICCEDE 2020, held in Greater Noida, India, in October 2020. Due to the COVID-19 pandemic the conference was held online.
The 9 full papers and 2 short papers presented in this volume were thoroughly reviewed and selected from 193 submissions. The papers are organized in topical sections on cyber security issues and challenges in emerging digital era; security resilience in contemporary applications.
Preface Organization Invited Talks Neoteric Frontiers in Cloud and Edge Computing (Keynote/Plenary) A Comparative Study of Machine Learning Techniques in Cyberthreat and Cyberattack Detection Cyber Ranges and Security Testbeds Contents Cyber Security Issues and Challenges in Emerging Digital Era Empirical Findings of Assessment of Critical Infrastructure Degree of Dependency on ICT 1 Introduction 2 Background and Related Works 3 Research Methodology 4 The Computational Model 4.1 Critical Infrastructure Characterisation 4.2 Dependency Assessment Metric 4.3 Computation Model 4.4 The ICT Dependency Quadrant (IDQ) 4.5 The ICT Dependency Mathematical Model 5 Data Presentation 6 Findings, Analysis and Discussions 7 Conclusion References Mapping of Security Issues and Concerns in Cloud Computing with Compromised Security Attributes 1 Introduction 2 Cloud Security Issues and Concerns 2.1 Management Interface Compromise 2.2 Multi-tenancy 2.3 Elasticity 2.4 Vendor Lock-in 2.5 Isolation Failure 2.6 Insecure or Incomplete Data Deletion 2.7 Network Attacks 2.8 High Availability and DR Readiness 2.9 Access Control 2.10 Authentication and Authorization 2.11 Defense-in-Depth 2.12 Misuse and Iniquitous Use of Cloud Computing Environment 2.13 Unidentified Risk Report and Service Level Agreement 2.14 Compliance Risks 2.15 Location Transparency 2.16 Insider Attacks/Wicked Insiders 2.17 Accountability and Auditing 2.18 Use of Proper Secure Protocols and Security Standards 2.19 Virtualization Risks 2.20 Secure Patches and Updates 2.21 Data Protection and Data Privacy 2.22 Data Crash and Data Loss 2.23 Data Interception 2.24 Proper Use of Strong Cryptographic Functions 2.25 Insecure API 2.26 Account, Service, Traffic and Session/TCP Hijacking 2.27 Web Based Attacks 2.28 Privilege Escalation 3 Observations and Findings 4 Conclusion References Detection of Malicious Executable in Linux Environment Using Tree-Based Classifiers 1 Introduction 2 Related Work 3 Methodology 3.1 Building Dataset 3.2 Feature Extraction 3.3 Feature Selection 3.4 Training of the Classifiers 4 Results and Discussion 5 Conclusions References Evading Detection Systems by Generating Adversarial Malware Examples 1 Introduction 2 Architecture of Malware-GAN 2.1 Overview 2.2 Generator 2.3 Substitute Detector 2.4 Training Malware-GAN 3 Implementation 3.1 Comparison with the Gradient Based Algorithm to Generate Adversarial Examples 3.2 Experimental Results 4 Conclusion References Artificial Intelligence Fostering Fintech: Emerging Trends and Use Cases 1 Introduction 2 Need of the Study 3 Objectives of the Study 4 Emergence and Adoption of Fintech in India 5 Adoption Challenges 6 Impact of Fintech Adoption on the Indian Financial Sector 7 Emerging Trends and Opportunities 8 Artificial Intelligence in Fintech: Use Cases 9 Conclusion 10 Recommendations References Security Resilience in Contemporary Applications Improving Smart Healthcare Safety and Security Using Kinect 1 Introduction 2 Related Work 3 Preliminaries: KINECT 4 Proposed Methodology 4.1 Using Kinect to Control the System Cursor 4.2 Speech Recognition 4.3 3D Scanning of Real Objects 5 Performance Analysis 5.1 Comparison with Manual Work 5.2 Comparison with Existing Schemes 5.3 Results and Discussion 6 Conclusion and Future Work References CrawlBot: A Domain-Specific Pseudonymous Crawler 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Pseudonymous Crawling Strategy 3.2 Page Classifier 3.3 Link Classifier 4 Evaluation 4.1 Selection of a Classifier 4.2 Nature of Darknet and It’s Interconnectivity 4.3 Harvest Rate 5 Conclusion and Future Work References A Lightweight Authentication and Key Establishment Scheme for Smart Metering Infrastructure 1 Introduction 2 Related Work 2.1 Contribution 3 System Model 3.1 Entities 3.2 Assumptions 3.3 Security Requirements 4 Proposed Protocol 4.1 Initial Phase 4.2 Registration Phase 4.3 Authentication Phase 4.4 Proof of Correctness 5 Security Analysis 5.1 Formal Security Analysis 6 Computational Cost Analysis 7 Conclusion References Performance Evaluation of Ryu Controller with Weighted Round Robin Load Balancer 1 Introduction 2 Similar Works 3 Background Topics 3.1 SDN Architecture 3.2 Controller 3.3 Mininet 3.4 Ryu 4 Primary Experiment 4.1 Network Setup 4.2 Work Process 4.3 Work Flow 4.4 Results and Evaluations 5 Conclusion References An IoT Based Intelligent Control System for Physically Disabled People 1 Introduction 2 Related Works 3 System Design 4 Results and Discussion 5 Conclusion References Role of Classification Model with Fuzzy Model to Predict Covid-19: A Comparative Study 1 Introduction 2 Related Work 3 Material and Methods 4 Result 5 Conclusion References Author Index
Donate to keep this site alive
To access the Link, solve the captcha.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.