Security Analytics: A Data Centric Approach to Information Security
The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data.
- Helps to develop an understanding of how to acquire, prepare, visualize security data.
- Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons.
- Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area.
Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.
Cover Half Title Series Page Title Page Copyright Page Table of Contents Preface Editors Contributors Chapter 1: A Reliable Blockchain Application for Music in a Decentralized Network 1.1 Introduction 1.1.1 Need of Change in Music Industry 1.1.2 Challenges Faced by the Music Industry 1.2 Introduction to Blockchain 1.3 Blockchain Technologies 1.3.1 Smart Contracts 1.3.2 Ethereum 1.4 Framework for Royalty Distribution Using Blockchain 1.5 Implementation and Results 1.6 Future Research Prospects 1.6.1 Universal Music Database 1.6.2 Digital Content Distribution and Licensing 1.6.3 Affordable Music Sampling 1.7 Drawbacks 1.8 Conclusion References Chapter 2: An Authentic Data-Centric Application for Medical Stores 2.1 Introduction 2.1.1 Purpose 2.1.2 Intended Audience 2.1.3 Product Scope 2.1.4 Tech Stack Description 2.1.5 Existing System 2.2 Literature Survey 2.3 Proposed Methodology for a Data-Centric Approach in Medical Stores 2.3.1 Implementation of Intelligent Pharmacy Application 2.3.2 Results and Discussion 2.4 Conclusion References Chapter 3: Intelligent Data-Analytic Approach for Restaurant Recommendation 3.1 Introduction to Machine Learning 3.2 Related Work 3.2.1 Exploring Venue Popularity 3.2.2 Software Fault Prediction 3.2.3 Temperature and Humidity Data Analysis 3.2.4 Educational Data Mining for Prediction of Student Performance 3.2.5 Crime Prediction and Forecasting 3.2.6 Ship Trajectory Prediction 3.2.7 Incident Analysis and Prediction 3.2.8 Cross-Validation of Protein Structural Class Prediction 3.3 Research Methodology – from Collecting Data to Suggesting Places 3.3.1 Data Sources (Our Data Points) 3.3.2 Analysis of the Venues Retrieved (Formatting and Cleaning) 3.3.3 Some Venues Have Been Replaced with New Venues 3.3.4 Clustering – Finding Similar Places 3.3.5 K-Means Clustering – the Hot Approach 3.4 Result and Analysis 3.4.1 Categories – Types of Restaurants 3.4.2 Average Rating for the Places 3.4.3 Average Price Per Person of Venues 3.5 Conclusion References Chapter 4: Investigation on Mobile Forensics Tools to Decode Cyber Crime 4.1 Introduction to Mobile Forensics: Process and Methodology 4.2 Preservation of Evidences in Mobile Device 4.3 Acquisition from Mobile Device 4.4 Examination and Analysis: Tools and Techniques 4.5 SIM Forensics and Reporting of Evidences 4.6 Conclusion References Chapter 5: Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications 5.1 Introduction 5.2 Microstrip Patch Antennas 5.3 Electromagnetic Bandgap Structure 5.4 Metamaterial Structure 5.5 Multiple Input and Multiple Output (MIMO) Systems 5.6 Techniques of Microstrip Patch Antennas 5.7 Advantages and Disadvantages 5.8 Applications 5.9 Tools of Microstrip Patch Antenna 5.10 Parameters of Microstrip Patch Antenna 5.11 Conclusion References Chapter 6: Optical Encryption of Images Using Partial Pivoting Lower Upper Decomposition Based on Two Structured Deterministic Phase Masks in the Hybrid Transform Domain 6.1 Introduction 6.2 Theoretical Background 6.2.1 Discrete Cosine Transform 6.2.2 Fractional Fourier Transform 6.2.3 Structured Deterministic Phase Mask 6.3 Proposed Cryptosystem 6.4 Simulation and Evaluation 6.4.1 Statistical Analysis 6.4.2 Attack Analysis 6.4.3 NPCR and UACI Analysis 6.4.4 Key Sensitivity Analysis 6.5 Performance Comparison 6.6 Conclusion References Chapter 7: A Comparative Analysis of Blockchain Integrated IoT Applications 7.1 Introduction 7.2 Introduction to Internet of Things 7.2.1 IoT Architecture 7.2.2 Challenges in IoT 7.3 Introduction to Blockchain 7.3.1 Important Features of Blockchain 7.3.2 Types of Blockchain Models 7.3.3 Blockchain Benefits 7.3.4 Technology for Secure Blockchain Architecture 7.4 Integration of Blockchain and IoT 7.4.1 Advantages of Using Blockchain IoT 7.5 Analysis of Various IoT Applications with Blockchain 7.5.1 Supply Chain 7.5.2 Ride Hiring System 7.5.3 Solar Energy 7.5.4 Printing Machine 7.5.5 Home Space 7.5.6 Waste Management 7.5.7 Agriculture System 7.5.8 Healthcare System 7.5.9 Miscellaneous Applications 7.5.10 Application Implementation 7.5.11 Analysis of Blockchain Integrated IoT Applications 7.6 Conclusion and Summary References Chapter 8: Blockchain: A New Power-Driven Technology for Smart Cities 8.1 Introduction: Background and Driving Forces 8.2 Solar Energy Smart Grid Powered with Blockchain 8.3 Feedback and Opinion Gathering with Blockchain 8.4 Conducting Elections and Referendums 8.5 Citizen Rating Based on Environmental Awareness 8.6 Secure Storage of Private and Sensitive Data of Citizens 8.7 Generating New Streams of Income for Local Administrative and Municipal Bodies 8.8 Blockchain-Based Universal Identification 8.9 Education 8.10 Healthcare 8.11 Parking Management 8.12 Resource Management 8.13 Resource Management 8.14 Limitation of Blockchain 8.15 Conclusion References Chapter 9: Mutual Surf-Scaling Factor Features Analysis for Detecting DDoS Attacks Based on Lattice Behavioral Using Spread Spectral Soft-Max-Recurrent Neural Networks 9.1 Introduction 9.2 Related Work 9.3 Mutual Surf-Scaling Factor Features Analysis for Detecting DDoS Attacks 9.3.1 Data Preprocessing 9.3.2 Lattice Behavioral Access Rate (LBAW) 9.3.3 Social Spider Comp Feature Section (S2CFS) 9.3.4 Mutual Scaling Features and Ranking 9.3.5 Soft-Max Logical Activation Function (SmLAF) 9.3.6 Spread Spectral Recurrent Neural Network (S2RNN) 9.4 Result and Discussion 9.5 Conclusion References Chapter 10: Provably Secure Role Delegation Scheme for Medical Cyber-Physical Systems 10.1 Introduction 10.1.1 Proxy Signature Technique 10.1.2 Forward-Secure Technique 10.2 Related Work 10.2.1 Case Study 10.3 Framework for Proposed Methodology 10.3.1 The Proposed PB-FSPS Algorithm Setup Phase System Initialization/Define Public Parameters Warrant Generation Phase Warrant Verification Phase Forward-Secure Proxy Key Generation Forward-Secure Proxy Signature Generation Forward-Secure Proxy Signature Verification Correctness of Proposed Algorithm 10.4 Protocol Analysis Using BAN Logic 10.4.1 Idealized Protocol 10.4.2 Initial Assumptions 10.4.3 Goals 10.4.4 Protocol Analysis Consider Message Consider Message 10.5 Simulation Study of PB-FSPS 10.6 Conclusion References Chapter 11: FRAME Routing to Handle Security Attacks in Wireless Sensor Networks 11.1 Introduction 11.2 Literature Survey 11.3 FRAME Routing Algorithm 11.3.1 FRAME Routing 11.3.2 Bayesian Network 11.4 Results and Discussion 11.4.1 AODV Without Attacks 11.4.2 AODV with Attacks 11.4.3 FRAME Without Attacks 11.4.4 FRAME with Attacks 11.5 Conclusion 11.5.1 Summary of the Work 11.5.2 Performance Analysis and Conclusion 11.5.3 Future Scope References Chapter 12: A Blockchain Security Management Based on Rehashing Shift Code Rail Encryption Using Circular Shift Round Random Padding Key for Decentralized Cloud Environment 12.1 Introduction 12.2 Related Work 12.3 Problem Consideration 12.4 Materials and Methods for Improved Blockchain Security 12.5 Hyperledger Transaction Security 12.6 Smart Contracting Security 12.7 Blockchain Initialization 12.8 Padding Key Substitution-Algorithm 12.9 Hash Key Generation on Padding 12.10 Circular Shifting Block Generation 12.11 Rehashing Shift Code Rail Encryption 12.12 Peer Verification on Exponential Session 12.13 Verified Authenticity Key Logs 12.14 Result and Discussion 12.15 Conclusion References Chapter 13: Application of Exact Barrier-Penalty Function for Developing Privacy Mechanisms in Cyber-Physical Systems 13.1 Introduction 13.2 Related Work 13.3 Problem Formulation 13.4 Proposed Mechanism 13.5 Experimental Results 13.6 Future Scope 13.7 Conclusion References Index
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.