This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introduction of security, its varied domains, and its implications in any working organization; moreover, it will talk about the risk factor of various attacks and threats. The concept of privacy and anonymity has been taken into consideration in consecutive chapters. Various topics including, The Onion Router (TOR) and other anonymous services, are precisely discussed with a practical approach. Further, chapters to learn the importance of preventive measures such as intrusion detection system (IDS) are also covered. Due to the existence of severe cyberattacks, digital forensics is a must for investigating the crime and to take precautionary measures for the future occurrence of such attacks. A detailed description of cyberinvestigation is covered in a chapter to get readers acquainted with the need and demands. This chapter deals with evidence collection from the victim's device and the system that has importance in the context of an investigation. Content covered in all chapters is foremost and reported in the current trends in several journals and cybertalks.
The proposed book is helpful for any reader who is using a computer or any such electronic gadget in their daily routine. The content of the book is prepared to work as a resource to any undergraduate and graduate-level student to get aware about the concept of cybersecurity, various cyberattacks, and threats in the security. In addition to that, it aimed at assisting researchers and developers to build a strong foundation for security provisioning in any newer technology which they are developing.
|
1 Introduction to Cybersecurity |
|
|
1 | (16) |
|
1 Introduction to Cybersecurity |
|
|
1 | (2) |
|
|
1 | (1) |
|
1.2 The Necessity of Cybersecurity |
|
|
1 | (1) |
|
1.3 Cybersecurity and Ethics |
|
|
2 | (1) |
|
2 Domains of Cybersecurity |
|
|
3 | (5) |
|
|
8 | (4) |
|
3.1 Threats in Cyberspace |
|
|
9 | (1) |
|
|
9 | (2) |
|
3.3 Threat Actors and Types of Threat Actors |
|
|
11 | (1) |
|
|
12 | (1) |
|
5 Awareness of Cybersecurity in Educational System |
|
|
13 | (1) |
|
6 The Outline of the Book |
|
|
14 | (2) |
|
|
16 | (1) |
|
2 Being Hidden and Anonymous |
|
|
17 | (20) |
|
|
17 | (4) |
|
1.1 The Need for Anonymity |
|
|
18 | (3) |
|
|
21 | (1) |
|
3 Invisible Internet Project (IIP or I2P) |
|
|
22 | (8) |
|
|
25 | (5) |
|
|
30 | (3) |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (20) |
|
|
37 | (2) |
|
|
39 | (4) |
|
|
41 | (2) |
|
3 TOR Browser Installation |
|
|
43 | (3) |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
49 | (3) |
|
|
52 | (2) |
|
|
54 | (1) |
|
|
55 | (2) |
|
4 DarkNet and Hidden Services |
|
|
57 | (14) |
|
|
57 | (1) |
|
2 TOR and Its Hidden Service |
|
|
58 | (3) |
|
3 Essential Concepts of TOR Hidden Services |
|
|
61 | (2) |
|
4 Installation of Hidden Service in Linux |
|
|
63 | (5) |
|
5 Countermeasures to Secure Your Own Hidden Service |
|
|
68 | (1) |
|
|
69 | (2) |
|
5 Introduction to Digital Forensics |
|
|
71 | (30) |
|
1 Introduction to Forensics |
|
|
71 | (1) |
|
|
72 | (3) |
|
3 Different Artifacts and Forensic Tools |
|
|
75 | (8) |
|
|
78 | (1) |
|
|
79 | (3) |
|
3.3 Belkasoft Live RAM Capturer |
|
|
82 | (1) |
|
|
83 | (9) |
|
|
83 | (2) |
|
|
85 | (4) |
|
|
89 | (3) |
|
|
92 | (8) |
|
|
94 | (1) |
|
|
95 | (2) |
|
|
97 | (1) |
|
5.4 Dynamic Host Control Protocol (DHCP) Redirection |
|
|
98 | (1) |
|
5.5 Detection of TOR Traffic in the Captured Traffic |
|
|
98 | (2) |
|
|
100 | (1) |
|
|
100 | (1) |
|
6 Intrusion Detection Systems Fundamentals |
|
|
101 | (28) |
|
1 Introduction to Intrusion Detection System |
|
|
101 | (1) |
|
2 Techniques to Combat Cyberthreats |
|
|
102 | (5) |
|
|
103 | (1) |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
106 | (1) |
|
2.5 Intrusion Detection System |
|
|
106 | (1) |
|
3 Network-Based Intrusion Detection System (NIDS) |
|
|
107 | (1) |
|
4 Host-Based Intrusion Detection System (HIDS) |
|
|
108 | (2) |
|
5 Distributed Intrusion Detection System (DIDS) |
|
|
110 | (3) |
|
5.1 Signature-Based Analysis |
|
|
112 | (1) |
|
5.2 Anomaly-Based Analysis |
|
|
112 | (1) |
|
6 Snort--Network-Based Intrusion Detection System |
|
|
113 | (9) |
|
6.1 Additional Snort Add-Ons |
|
|
114 | (1) |
|
6.2 Installation of Snort in Linux |
|
|
115 | (5) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
7 Open-Source Host-Based Intrusion Detection System (OSSEC) |
|
|
122 | (4) |
|
7.1 Installation of OSSEC in Linux |
|
|
124 | (2) |
|
|
126 | (1) |
|
|
126 | (3) |
|
7 Introduction to Malware Analysis |
|
|
129 | (14) |
|
1 Introduction of Malware |
|
|
129 | (1) |
|
|
130 | (2) |
|
|
132 | (1) |
|
4 Need of Malware Analysis and Spreading Mechanism |
|
|
132 | (2) |
|
4.1 Need for Malware Analysis |
|
|
133 | (1) |
|
4.2 Malware Spreading Mechanism |
|
|
133 | (1) |
|
5 Malware Analysis Prerequisites |
|
|
134 | (1) |
|
6 Malware Analysis Environment |
|
|
135 | (1) |
|
7 Malware Detection System and Analysis |
|
|
135 | (4) |
|
|
136 | (1) |
|
|
137 | (2) |
|
|
139 | (1) |
|
|
139 | (4) |
|
8 Design of a Virtual Cybersecurity Lab |
|
|
143 | (16) |
|
1 Introduction of Cybersecurity |
|
|
143 | (1) |
|
2 Tools for Cybersecurity |
|
|
144 | (1) |
|
3 Virtualization for Cybersecurity |
|
|
145 | (3) |
|
4 Installation and Configuration of VMWare Workstation |
|
|
148 | (1) |
|
5 Network Modes in Virtual Machines |
|
|
149 | (1) |
|
6 Cybersecurity and Various Attacks |
|
|
149 | (1) |
|
7 Defense Strategies Against Various Attacks |
|
|
150 | (4) |
|
8 Case Study on Website Attacks |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
156 | (3) |
|
|
159 | (15) |
|
|
159 | (2) |
|
2 Why Cyberlaw is Necessary |
|
|
161 | (2) |
|
3 Global Landscape of Cyberlaw |
|
|
163 | (3) |
|
|
166 | (7) |
|
4.1 Categories of Cybercrime |
|
|
168 | (1) |
|
|
168 | (5) |
|
|
173 | (1) |
References |
|
174 | |
Nitul Dutta is currently working as an Associate Professor in the Computer Science and Engineering Department at SRM University, Andhra Pradesh. He received his B.E. degree in Computer Science and Engineering from Jorhat Engineering College, Assam and M. Tech. in Information Technology from Tezpur University, Assam. He completed his Ph.D. (Engineering) in the field of Computer Networking from Jadavpur University, West Bengal (2013). He also worked as a Post-Doctoral Fellow (PDF) at Jan Wyzykowski University, Polkowice, Poland. He worked in Tezpur Central University, for nearly nine years, worked at Marwadi University Rajkot, Gujarat and Sikkim Manipal Institute of Technology, Sikkim prior to joining the current assignment. His current research interests are Information Centric Network, mobility management in IPv6 based networks and cognitive radio networks. He is a senior member of IEEE and vice-chair of IEEE Computational Intelligence Society, Gujarat section. He also published more than 30 papers in International journals of repute. He also published two books, Recent Developments on Industrial Control Systems Resilience (Edited), Springer, 2020 and Information Centric Networks (ICN): Architecture & Current Trends, (Reference), Springer, 2021. Nilesh Jadav is currently working as an assistant professor in the Computer Engineering Department of Marwadi University, Gujarat, India. He completed his Master of Engineering in the field of wireless network from Gujarat Technological University, India. His current research interest includes wireless communication, network traffic analysis and network security. Sudeep Tanwar (Senior Member, IEEE) is currently working as a Professor with the Computer Science and Engineering Department, Institute of Technology, Nirma University, India. He is also a Visiting Professor with Jan Wyzykowski University, Polkowice, Poland, and the University of Pitesti in Pitesti, Romania. He received B.Tech in 2002 from Kurukshetra University, India, M.Tech (Honors) in 2009 from Guru Gobind Singh Indraprastha University, Delhi, India and Ph.D. in 2016 with specialization in Wireless Sensor Network from Mewar University, India. He has authored two books and edited 13 books, more than 250 technical articles, including top journals and top conferences, such as IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, IEEE WIRELESS COMMUNICATIONS, IEEE NETWORKS, ICC, GLOBECOM, and INFOCOM. He initiated the research field of blockchain technology adoption in various verticals, in 2017. His H-index is 43. He actively serves his research communities in various roles. His research interests include blockchain technology, wireless sensor networks, fog computing, smart grid, and the IoT. He is a Final Voting Member of the IEEE ComSoc Tactile Internet Committee, in 2020. He is a Senior Member of IEEE, Member of CSI, IAENG, ISTE, and CSTA, and a member of the Technical Committee on Tactile Internet of IEEE Communication Society. He has been awarded the Best Research Paper Awards from IEEE IWCMC-2021, IEEE GLOBECOM 2018, IEEE ICC 2019, and Springer ICRIC-2019. He has served many international conferences as a member of the Organizing Committee, such as the Publication Chair for FTNCT-2020, ICCIC 2020, and WiMob2019, a member of the Advisory Board for ICACCT-2021 and ICACI 2020, a Workshop Co-Chair for CIS 2021, and a General Chair for IC4S 2019, 2020, and ICCSDF 2020. He is also serving the editorial boards of Physical Communication, Computer Communications, International Journal of Communication System, and Security and Privacy. He is also leading the ST Research Laboratory, where group members are working on the latest cutting-edge technologies. Hiren Kumar Deva Sarma is currently a professor in the Department of Information Technology, Sikkim Manipal Institute of Technology, Sikkim. He received a B.E. degree in Mechanical Engineering from Assam Engineering College in 1998. He completed Master of Technology in Information Technology from Tezpur University in 2000. He received his Ph.D. degree from Jadavpur University (Department of Computer Science and Engineering) in 2013. He is a recipient of Young Scientist Award from International Union of Radio Science (URSI) awarded in the XVIII General Assembly 2005, held at New Delhi, India. Dr. Sarma received IEEE Early Adopter Award in the year 2014. He has published more than seventy research papers in different International Journals, referred International and National Conferences of repute. His current research interests are wireless sensor networks, mobility management in IPv6-based network, cognitive radio networks, ICN, network security, robotics, distributed computing and big data analytics. Emil Pricop is currently an Associate Professor and the Head of the Automatic Control, Computers and Electronics Department of the Petroleum-Gas University of Ploiesti, Romania. Also, he is an invited professor at the Computer Engineering Department of Faculty of Engineering (FoE), Marwadi University, Rajkot, Gujarat, India. He has held the position of Senior Lecturer since 2018. Dr. Pricop is teaching computer networking, software engineering, human-computer interaction, and critical infrastructure protection courses. He received his Ph.D. in Systems Engineering from Petroleum-Gas University of Ploiesti by defending in May 2017 the thesis Research regarding the security of control systems. His research interest is cybersecurity, focusing primarily on industrial control systems security. Dr. Emil Pricop is co-editor of two books published by Springer, namely Recent Advances in Systems Safety & Security (Springer, 2016) and Recent Developments on Industrial Control Systems Resilience (Springer, 2020). Also, Dr. Pricop is the author or co-author of 2 national (Romanian) patents, six (6) book chapters published in books edited by Springer and over 30 papers in journals or international conferences. Since 2013, Dr. Pricop is the initiator and chairman of the International Workshop on Systems Safety and Security IWSSS, a prestigious scientific event organized annually. Dr. Pricop participated in more than 100 technical program committees of prestigious international conferences organized under the auspices of IEEE. He has held the vice-chair position of the IEEE Young Professionals Affinity Group - Romania Section from 2017 to 2019.