Cybersecurity of Digital Service Chains : Challenges, Methodologies, and Tools.

Bibliographic Details
Main Author: Kołodziej, Joanna.
Other Authors: Repetto, Matteo., Duzha, Armend.
Format: eBook
Language:English
Published: Cham : Springer International Publishing AG, 2022.
Edition:1st ed.
Series:Lecture Notes in Computer Science Series
Subjects:
Online Access:Click to View
Table of Contents:
  • Intro
  • Preface
  • Acknowledgements
  • Contents
  • A Reference Architecture for Management of Security Operations in Digital Service Chains
  • 1 Introduction
  • 2 Related Work
  • 3 The GUARD Framework
  • 4 GUARD Platform
  • 4.1 Security Analytics Pipelines
  • 4.2 Context-Broker Manager
  • 4.3 Security Controller
  • 4.4 Dashboard
  • 5 GUARD Operation
  • 5.1 Discovery and Management of Security Capabilities
  • 5.2 Identity Management and Access Control
  • 5.3 Workflows
  • 6 Validation and Performance Analysis
  • 6.1 Data Handling Pipeline
  • 6.2 Control Abstraction
  • 7 Conclusion
  • References
  • Monitoring Network Flows in Containerized Environments
  • 1 Introduction
  • 2 Flow Monitoring
  • 2.1 Existing Tools and Limitations
  • 2.2 The Extended Berkeley Packet Filter
  • 2.3 eBPF for Monitoring, Inspection, and Enforcement
  • 3 A New Flow Monitoring Tool: bpfFlowMon
  • 4 Evaluation
  • 4.1 Accuracy
  • 4.2 Performance and Overhead
  • 5 Limitations of the Proposed Approach
  • 6 Related Work
  • 7 Conclusion
  • References
  • Intelligent Transportation Systems - Models, Challenges, Security Aspects
  • 1 Introduction
  • 2 Intelligent Transportation Models
  • 2.1 Examples of the Traffic Flow ITS Models
  • 2.2 ICT Supporting Models for Traffic Flow
  • 2.3 ITS e-Business Aspects and Models
  • 3 Methods of Detection of Anomalies, Attacks and Threats in ICT Systems
  • 3.1 Attack Technique and Thread Impact Criteria
  • 3.2 Known and Unknown Attacks
  • 4 ITS Practical Example - Wobcom Smart City Project with GUARD Support
  • 4.1 Security Aspects of ITS Integration with the GUARD Project
  • 5 Conclusions
  • References
  • NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic
  • 1 Introduction
  • 2 Anomaly Detection with Machine Learning
  • 2.1 Machine Learning Methods
  • 2.2 Attack Emulation
  • 2.3 Adjusting Detection Threshold.
  • 2.4 Ensemble Learning
  • 3 The NAD Architecture
  • 3.1 Modules
  • 3.2 Deployment schemes
  • 3.3 Integration with the Real Network Infrastructure
  • 4 Experiments
  • 4.1 Repeatability
  • 4.2 Unknown DoS Detection
  • 4.3 Ensemble Models
  • 4.4 Threshold Adjustment
  • 5 Conclusions
  • References
  • Detecting Unknown Cyber Security Attacks Through System Behavior Analysis
  • 1 Introduction
  • 2 Log Data Analysis for Security Purposes
  • 3 Incremental Character-Based Event Processing
  • 4 Creating Cluster Templates
  • 5 Learning Data Structures and Creating Tree-Based Parsers
  • 6 System Behavior Modeling and ML-Based Anomaly Detection
  • 7 Conclusion
  • References
  • Signature-Based Detection of Botnet DDoS Attacks
  • 1 Introduction
  • 2 PGA Signatures
  • 2.1 Network Telescope
  • 2.2 DDoS Seen Through Network Telescope
  • 2.3 Botnets
  • 2.4 Packet Generation Algorithm
  • 2.5 Generating PGA Signatures
  • 3 PGA Filter
  • 3.1 Extended Barkeley Packet Filter
  • 3.2 PGA Filter Architecture
  • 3.3 PGA Filter Integration in the GUARD Framework
  • 4 Conclusion
  • References
  • Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation
  • 1 Introduction
  • 2 Entities and Operations
  • 2.1 Overview
  • 2.2 Alerts
  • 2.3 Alert Groups
  • 2.4 Meta-alerts
  • 3 Application Example
  • 3.1 CTI Process Flow
  • 3.2 Data Generation
  • 3.3 CTI Dashboard
  • 4 Conclusion
  • References
  • Blockchain-Based Task and Information Management in Computational Cloud Systems
  • 1 Introduction
  • 2 Blockchain Backgrounds
  • 2.1 Blockchain Network
  • 2.2 Blockchain Components, Protocols and Algorithms
  • 2.3 Consensus Models
  • 2.4 Blockchain Taxonomies
  • 2.5 Security in BC Networks
  • 2.6 Blockchain Usecases
  • 3 Security Criterion in Scheduling and Resource Allocation Problems in Computational Clouds.
  • 3.1 Security-Aware Cloud Schedulers - A Short Survey of Recent Schedulers
  • 4 Blockchain-Based Secure Cloud Scheduler
  • 4.1 Clients and Cloud Service Providers
  • 4.2 Pool of Requests
  • 4.3 Nodes and Transactions
  • 4.4 Chain of Blocks
  • 4.5 Proof of Schedule - Generalized Stackelberg Game
  • 4.6 Blocks Mining
  • 4.7 Profits for Task Schedulers
  • 4.8 Evaluation Examples
  • 5 Conclusions
  • References
  • Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them?
  • 1 Introduction
  • 2 Contemporary Ethical Issues in Cybersecurity
  • 2.1 Data Privacy of Users
  • 2.2 Security Breaches and Risks. Contemplating the Idea of "Ethical Hacking"
  • 2.3 New Risks in Developing Fields - IoT and Cloud Computing
  • 2.4 Risks While Testing New Technology
  • 3 Required Measures to Ensure Ethical Compliance
  • 3.1 Implementing Organisational Measures to Ensure Ethical Compliance
  • 3.2 Carrying Out an Impact Assessment
  • 3.3 Adopting Privacy Enhancing Technologies
  • 4 Conclusions
  • References
  • A Discussion on Ethical Cybersecurity Issues in Digital Service Chains
  • 1 Introduction
  • 2 Background and Related Work
  • 2.1 Cybersecurity and Information Security
  • 2.2 Data Commercialization
  • 2.3 Digital Service Chains
  • 2.4 Ethics in Cybersecurity
  • 2.5 Related Work
  • 3 Methodology
  • 4 Ethical Issues
  • 4.1 Content Creation
  • 4.2 Aggregation
  • 4.3 Distribution
  • 4.4 Data Transport
  • 4.5 Digital Experience
  • 5 Discussion
  • 6 Conclusion and Future Work
  • References
  • Author Index.