Cybersecurity of Digital Service Chains : Challenges, Methodologies, and Tools.
Main Author: | |
---|---|
Other Authors: | , |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing AG,
2022.
|
Edition: | 1st ed. |
Series: | Lecture Notes in Computer Science Series
|
Subjects: | |
Online Access: | Click to View |
Table of Contents:
- Intro
- Preface
- Acknowledgements
- Contents
- A Reference Architecture for Management of Security Operations in Digital Service Chains
- 1 Introduction
- 2 Related Work
- 3 The GUARD Framework
- 4 GUARD Platform
- 4.1 Security Analytics Pipelines
- 4.2 Context-Broker Manager
- 4.3 Security Controller
- 4.4 Dashboard
- 5 GUARD Operation
- 5.1 Discovery and Management of Security Capabilities
- 5.2 Identity Management and Access Control
- 5.3 Workflows
- 6 Validation and Performance Analysis
- 6.1 Data Handling Pipeline
- 6.2 Control Abstraction
- 7 Conclusion
- References
- Monitoring Network Flows in Containerized Environments
- 1 Introduction
- 2 Flow Monitoring
- 2.1 Existing Tools and Limitations
- 2.2 The Extended Berkeley Packet Filter
- 2.3 eBPF for Monitoring, Inspection, and Enforcement
- 3 A New Flow Monitoring Tool: bpfFlowMon
- 4 Evaluation
- 4.1 Accuracy
- 4.2 Performance and Overhead
- 5 Limitations of the Proposed Approach
- 6 Related Work
- 7 Conclusion
- References
- Intelligent Transportation Systems - Models, Challenges, Security Aspects
- 1 Introduction
- 2 Intelligent Transportation Models
- 2.1 Examples of the Traffic Flow ITS Models
- 2.2 ICT Supporting Models for Traffic Flow
- 2.3 ITS e-Business Aspects and Models
- 3 Methods of Detection of Anomalies, Attacks and Threats in ICT Systems
- 3.1 Attack Technique and Thread Impact Criteria
- 3.2 Known and Unknown Attacks
- 4 ITS Practical Example - Wobcom Smart City Project with GUARD Support
- 4.1 Security Aspects of ITS Integration with the GUARD Project
- 5 Conclusions
- References
- NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic
- 1 Introduction
- 2 Anomaly Detection with Machine Learning
- 2.1 Machine Learning Methods
- 2.2 Attack Emulation
- 2.3 Adjusting Detection Threshold.
- 2.4 Ensemble Learning
- 3 The NAD Architecture
- 3.1 Modules
- 3.2 Deployment schemes
- 3.3 Integration with the Real Network Infrastructure
- 4 Experiments
- 4.1 Repeatability
- 4.2 Unknown DoS Detection
- 4.3 Ensemble Models
- 4.4 Threshold Adjustment
- 5 Conclusions
- References
- Detecting Unknown Cyber Security Attacks Through System Behavior Analysis
- 1 Introduction
- 2 Log Data Analysis for Security Purposes
- 3 Incremental Character-Based Event Processing
- 4 Creating Cluster Templates
- 5 Learning Data Structures and Creating Tree-Based Parsers
- 6 System Behavior Modeling and ML-Based Anomaly Detection
- 7 Conclusion
- References
- Signature-Based Detection of Botnet DDoS Attacks
- 1 Introduction
- 2 PGA Signatures
- 2.1 Network Telescope
- 2.2 DDoS Seen Through Network Telescope
- 2.3 Botnets
- 2.4 Packet Generation Algorithm
- 2.5 Generating PGA Signatures
- 3 PGA Filter
- 3.1 Extended Barkeley Packet Filter
- 3.2 PGA Filter Architecture
- 3.3 PGA Filter Integration in the GUARD Framework
- 4 Conclusion
- References
- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation
- 1 Introduction
- 2 Entities and Operations
- 2.1 Overview
- 2.2 Alerts
- 2.3 Alert Groups
- 2.4 Meta-alerts
- 3 Application Example
- 3.1 CTI Process Flow
- 3.2 Data Generation
- 3.3 CTI Dashboard
- 4 Conclusion
- References
- Blockchain-Based Task and Information Management in Computational Cloud Systems
- 1 Introduction
- 2 Blockchain Backgrounds
- 2.1 Blockchain Network
- 2.2 Blockchain Components, Protocols and Algorithms
- 2.3 Consensus Models
- 2.4 Blockchain Taxonomies
- 2.5 Security in BC Networks
- 2.6 Blockchain Usecases
- 3 Security Criterion in Scheduling and Resource Allocation Problems in Computational Clouds.
- 3.1 Security-Aware Cloud Schedulers - A Short Survey of Recent Schedulers
- 4 Blockchain-Based Secure Cloud Scheduler
- 4.1 Clients and Cloud Service Providers
- 4.2 Pool of Requests
- 4.3 Nodes and Transactions
- 4.4 Chain of Blocks
- 4.5 Proof of Schedule - Generalized Stackelberg Game
- 4.6 Blocks Mining
- 4.7 Profits for Task Schedulers
- 4.8 Evaluation Examples
- 5 Conclusions
- References
- Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them?
- 1 Introduction
- 2 Contemporary Ethical Issues in Cybersecurity
- 2.1 Data Privacy of Users
- 2.2 Security Breaches and Risks. Contemplating the Idea of "Ethical Hacking"
- 2.3 New Risks in Developing Fields - IoT and Cloud Computing
- 2.4 Risks While Testing New Technology
- 3 Required Measures to Ensure Ethical Compliance
- 3.1 Implementing Organisational Measures to Ensure Ethical Compliance
- 3.2 Carrying Out an Impact Assessment
- 3.3 Adopting Privacy Enhancing Technologies
- 4 Conclusions
- References
- A Discussion on Ethical Cybersecurity Issues in Digital Service Chains
- 1 Introduction
- 2 Background and Related Work
- 2.1 Cybersecurity and Information Security
- 2.2 Data Commercialization
- 2.3 Digital Service Chains
- 2.4 Ethics in Cybersecurity
- 2.5 Related Work
- 3 Methodology
- 4 Ethical Issues
- 4.1 Content Creation
- 4.2 Aggregation
- 4.3 Distribution
- 4.4 Data Transport
- 4.5 Digital Experience
- 5 Discussion
- 6 Conclusion and Future Work
- References
- Author Index.