|
|
|
|
LEADER |
07011nam a22004453i 4500 |
001 |
EBC6949311 |
003 |
MiAaPQ |
005 |
20231204023222.0 |
006 |
m o d | |
007 |
cr cnu|||||||| |
008 |
231204s2022 xx o ||||0 eng d |
020 |
|
|
|a 9783031040368
|q (electronic bk.)
|
020 |
|
|
|z 9783031040351
|
035 |
|
|
|a (MiAaPQ)EBC6949311
|
035 |
|
|
|a (Au-PeEL)EBL6949311
|
035 |
|
|
|a (OCoLC)1310782928
|
040 |
|
|
|a MiAaPQ
|b eng
|e rda
|e pn
|c MiAaPQ
|d MiAaPQ
|
050 |
|
4 |
|a TK5105.5-5105.9
|
100 |
1 |
|
|a Kołodziej, Joanna.
|
245 |
1 |
0 |
|a Cybersecurity of Digital Service Chains :
|b Challenges, Methodologies, and Tools.
|
250 |
|
|
|a 1st ed.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing AG,
|c 2022.
|
264 |
|
4 |
|c {copy}2022.
|
300 |
|
|
|a 1 online resource (267 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science Series ;
|v v.13300
|
505 |
0 |
|
|a Intro -- Preface -- Acknowledgements -- Contents -- A Reference Architecture for Management of Security Operations in Digital Service Chains -- 1 Introduction -- 2 Related Work -- 3 The GUARD Framework -- 4 GUARD Platform -- 4.1 Security Analytics Pipelines -- 4.2 Context-Broker Manager -- 4.3 Security Controller -- 4.4 Dashboard -- 5 GUARD Operation -- 5.1 Discovery and Management of Security Capabilities -- 5.2 Identity Management and Access Control -- 5.3 Workflows -- 6 Validation and Performance Analysis -- 6.1 Data Handling Pipeline -- 6.2 Control Abstraction -- 7 Conclusion -- References -- Monitoring Network Flows in Containerized Environments -- 1 Introduction -- 2 Flow Monitoring -- 2.1 Existing Tools and Limitations -- 2.2 The Extended Berkeley Packet Filter -- 2.3 eBPF for Monitoring, Inspection, and Enforcement -- 3 A New Flow Monitoring Tool: bpfFlowMon -- 4 Evaluation -- 4.1 Accuracy -- 4.2 Performance and Overhead -- 5 Limitations of the Proposed Approach -- 6 Related Work -- 7 Conclusion -- References -- Intelligent Transportation Systems - Models, Challenges, Security Aspects -- 1 Introduction -- 2 Intelligent Transportation Models -- 2.1 Examples of the Traffic Flow ITS Models -- 2.2 ICT Supporting Models for Traffic Flow -- 2.3 ITS e-Business Aspects and Models -- 3 Methods of Detection of Anomalies, Attacks and Threats in ICT Systems -- 3.1 Attack Technique and Thread Impact Criteria -- 3.2 Known and Unknown Attacks -- 4 ITS Practical Example - Wobcom Smart City Project with GUARD Support -- 4.1 Security Aspects of ITS Integration with the GUARD Project -- 5 Conclusions -- References -- NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic -- 1 Introduction -- 2 Anomaly Detection with Machine Learning -- 2.1 Machine Learning Methods -- 2.2 Attack Emulation -- 2.3 Adjusting Detection Threshold.
|
505 |
8 |
|
|a 2.4 Ensemble Learning -- 3 The NAD Architecture -- 3.1 Modules -- 3.2 Deployment schemes -- 3.3 Integration with the Real Network Infrastructure -- 4 Experiments -- 4.1 Repeatability -- 4.2 Unknown DoS Detection -- 4.3 Ensemble Models -- 4.4 Threshold Adjustment -- 5 Conclusions -- References -- Detecting Unknown Cyber Security Attacks Through System Behavior Analysis -- 1 Introduction -- 2 Log Data Analysis for Security Purposes -- 3 Incremental Character-Based Event Processing -- 4 Creating Cluster Templates -- 5 Learning Data Structures and Creating Tree-Based Parsers -- 6 System Behavior Modeling and ML-Based Anomaly Detection -- 7 Conclusion -- References -- Signature-Based Detection of Botnet DDoS Attacks -- 1 Introduction -- 2 PGA Signatures -- 2.1 Network Telescope -- 2.2 DDoS Seen Through Network Telescope -- 2.3 Botnets -- 2.4 Packet Generation Algorithm -- 2.5 Generating PGA Signatures -- 3 PGA Filter -- 3.1 Extended Barkeley Packet Filter -- 3.2 PGA Filter Architecture -- 3.3 PGA Filter Integration in the GUARD Framework -- 4 Conclusion -- References -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- 1 Introduction -- 2 Entities and Operations -- 2.1 Overview -- 2.2 Alerts -- 2.3 Alert Groups -- 2.4 Meta-alerts -- 3 Application Example -- 3.1 CTI Process Flow -- 3.2 Data Generation -- 3.3 CTI Dashboard -- 4 Conclusion -- References -- Blockchain-Based Task and Information Management in Computational Cloud Systems -- 1 Introduction -- 2 Blockchain Backgrounds -- 2.1 Blockchain Network -- 2.2 Blockchain Components, Protocols and Algorithms -- 2.3 Consensus Models -- 2.4 Blockchain Taxonomies -- 2.5 Security in BC Networks -- 2.6 Blockchain Usecases -- 3 Security Criterion in Scheduling and Resource Allocation Problems in Computational Clouds.
|
505 |
8 |
|
|a 3.1 Security-Aware Cloud Schedulers - A Short Survey of Recent Schedulers -- 4 Blockchain-Based Secure Cloud Scheduler -- 4.1 Clients and Cloud Service Providers -- 4.2 Pool of Requests -- 4.3 Nodes and Transactions -- 4.4 Chain of Blocks -- 4.5 Proof of Schedule - Generalized Stackelberg Game -- 4.6 Blocks Mining -- 4.7 Profits for Task Schedulers -- 4.8 Evaluation Examples -- 5 Conclusions -- References -- Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them? -- 1 Introduction -- 2 Contemporary Ethical Issues in Cybersecurity -- 2.1 Data Privacy of Users -- 2.2 Security Breaches and Risks. Contemplating the Idea of "Ethical Hacking" -- 2.3 New Risks in Developing Fields - IoT and Cloud Computing -- 2.4 Risks While Testing New Technology -- 3 Required Measures to Ensure Ethical Compliance -- 3.1 Implementing Organisational Measures to Ensure Ethical Compliance -- 3.2 Carrying Out an Impact Assessment -- 3.3 Adopting Privacy Enhancing Technologies -- 4 Conclusions -- References -- A Discussion on Ethical Cybersecurity Issues in Digital Service Chains -- 1 Introduction -- 2 Background and Related Work -- 2.1 Cybersecurity and Information Security -- 2.2 Data Commercialization -- 2.3 Digital Service Chains -- 2.4 Ethics in Cybersecurity -- 2.5 Related Work -- 3 Methodology -- 4 Ethical Issues -- 4.1 Content Creation -- 4.2 Aggregation -- 4.3 Distribution -- 4.4 Data Transport -- 4.5 Digital Experience -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Author Index.
|
588 |
|
|
|a Description based on publisher supplied metadata and other sources.
|
590 |
|
|
|a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
|
655 |
|
4 |
|a Electronic books.
|
700 |
1 |
|
|a Repetto, Matteo.
|
700 |
1 |
|
|a Duzha, Armend.
|
776 |
0 |
8 |
|i Print version:
|a Kołodziej, Joanna
|t Cybersecurity of Digital Service Chains
|d Cham : Springer International Publishing AG,c2022
|z 9783031040351
|
797 |
2 |
|
|a ProQuest (Firm)
|
830 |
|
0 |
|a Lecture Notes in Computer Science Series
|
856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=6949311
|z Click to View
|