Preface |
|
xv | |
Acknowledgments |
|
xxiii | |
|
1 Securing Cloud-Based Enterprise Applications and Its Data |
|
|
1 | (26) |
|
|
|
|
|
2 | (1) |
|
1.2 Background and Related Works |
|
|
3 | (2) |
|
1.3 System Design and Architecture |
|
|
5 | (4) |
|
1.3.1 Proposed System Design and Architecture |
|
|
5 | (1) |
|
|
5 | (1) |
|
1.3.2.1 Compute Instances |
|
|
5 | (1) |
|
|
6 | (1) |
|
1.3.2.3 Storage Bucket (Amazon S3) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
1.3.2.11 Linux Instance and Networking |
|
|
8 | (1) |
|
1.3.2.12 Virtual Network and Subnet Configuration |
|
|
8 | (1) |
|
|
9 | (12) |
|
|
9 | (1) |
|
1.4.2 Malware Injection Prevention |
|
|
9 | (1) |
|
1.4.3 Man-in-the-Middle Prevention |
|
|
9 | (1) |
|
1.4.4 Data at Transit and SSL |
|
|
9 | (1) |
|
1.4.5 Data Encryption at Rest |
|
|
10 | (1) |
|
1.4.6 Centralized Ledger Database |
|
|
10 | (1) |
|
|
10 | (1) |
|
1.4.8 Linux Instance and Server Side Installations |
|
|
10 | (11) |
|
|
21 | (2) |
|
|
21 | (1) |
|
1.5.2 Lambda (For Compression of Data) |
|
|
22 | (1) |
|
|
23 | (1) |
|
1.5.4 Data in Transit (Encryption) |
|
|
23 | (1) |
|
1.5.5 Data in Rest (Encryption) |
|
|
23 | (1) |
|
1.6 Future Research Direction |
|
|
23 | (1) |
|
|
24 | (3) |
|
|
25 | (2) |
|
2 High-Performance Computing-Based Scalable "Cloud Forensics-as-a-Service" Readiness Framework Factors--A Review |
|
|
27 | (20) |
|
|
|
|
|
28 | (1) |
|
|
29 | (1) |
|
2.3 Motivation for the Study |
|
|
29 | (1) |
|
|
30 | (2) |
|
|
32 | (1) |
|
2.6 Testing Environment Plan |
|
|
32 | (3) |
|
|
35 | (7) |
|
2.7.1 Scenario 1: Simultaneous Imaging and Upload and Encryption |
|
|
36 | (5) |
|
2.7.2 Scenario 2: Real-Time Stream Processing |
|
|
41 | (1) |
|
2.7.3 Scenario 3: Remote Desktop Connection, Performance Test |
|
|
41 | (1) |
|
|
42 | (1) |
|
2.9 Limitations of Present Study |
|
|
42 | (1) |
|
|
43 | (1) |
|
2.11 Scope for the Future Work |
|
|
43 | (4) |
|
|
44 | (1) |
|
|
44 | (3) |
|
3 Malware Identification, Analysis and Similarity |
|
|
47 | (24) |
|
|
|
|
48 | (1) |
|
3.1.1 Goals of Malware Analysis and Malware Identification |
|
|
48 | (1) |
|
3.1.2 Common Malware Analysis Techniques |
|
|
49 | (1) |
|
3.2 Background and Related Works |
|
|
49 | (2) |
|
3.3 Proposed System Design Architecture |
|
|
51 | (11) |
|
3.3.1 Tool Requirement, System Design, and Architecture |
|
|
51 | (1) |
|
3.3.1.1 For Static Malware Analysis |
|
|
51 | (5) |
|
3.3.1.2 For Dynamic Malware Analysis |
|
|
56 | (6) |
|
|
62 | (5) |
|
|
67 | (1) |
|
3.6 Future Research Direction |
|
|
67 | (1) |
|
|
68 | (3) |
|
|
68 | (3) |
|
4 Robust Fraud Detection Mechanism |
|
|
71 | (24) |
|
|
|
|
|
|
72 | (4) |
|
|
76 | (15) |
|
4.2.1 Blockchain Technology for Online Business |
|
|
76 | (3) |
|
4.2.2 Validation and Authentication |
|
|
79 | (2) |
|
4.2.3 Types of Online Shopping Fraud |
|
|
81 | (1) |
|
4.2.3.1 Software Fraudulent of Online Shopping |
|
|
81 | (1) |
|
4.2.4 Segmentation/Authentication |
|
|
82 | (1) |
|
4.2.4.1 Secure Transaction Though Segmentation Algorithm |
|
|
83 | (2) |
|
4.2.4.2 Critical Path Segmentation Optimization |
|
|
85 | (2) |
|
4.2.5 Role of Blockchain Technology for Supply Chain and Logistics |
|
|
87 | (4) |
|
|
91 | (4) |
|
|
92 | (3) |
|
5 Blockchain-Based Identity Management Systems |
|
|
95 | (34) |
|
|
|
|
|
|
|
96 | (3) |
|
|
99 | (10) |
|
5.2.1 Identity Management Systems |
|
|
99 | (1) |
|
|
99 | (1) |
|
5.2.1.2 Architecture of Identity Management Systems |
|
|
99 | (1) |
|
5.2.1.3 Types of Identity Management Systems |
|
|
100 | (1) |
|
5.2.1.4 Importance of Identity Management Systems |
|
|
101 | (1) |
|
|
102 | (1) |
|
5.2.2.1 Blockchain Architecture |
|
|
102 | (1) |
|
5.2.2.2 Components of Blockchain Architecture |
|
|
102 | (1) |
|
|
103 | (1) |
|
5.2.2.4 Consensus Algorithm |
|
|
103 | (2) |
|
5.2.2.5 Types of Blockchain Architecture |
|
|
105 | (1) |
|
|
106 | (3) |
|
5.3 Blockchain-Based Identity Management System |
|
|
109 | (13) |
|
5.3.1 Need for Blockchain-Based Identity Management Systems |
|
|
109 | (1) |
|
5.3.2 Approaches for Blockchain-Based Identity Management Systems |
|
|
110 | (1) |
|
5.3.3 Blockchain-Based Identity Management System Implementations |
|
|
111 | (9) |
|
5.3.4 Impact of Using Blockchain-Based Identity Management on Business and Users |
|
|
120 | (1) |
|
5.3.5 Various Use Cases of Blockchain Identity Management |
|
|
121 | (1) |
|
|
122 | (1) |
|
5.4.1 Challenges Related to Identity |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (5) |
|
|
125 | (4) |
|
6 Insights Into Deep Steganography: A Study of Steganography Automation and Trends |
|
|
129 | (28) |
|
|
|
|
|
130 | (1) |
|
6.2 Convolution Network Learning |
|
|
131 | (2) |
|
|
132 | (1) |
|
6.3 Recurrent Neural Networks |
|
|
133 | (3) |
|
6.3.1 RNN Forward Propagation |
|
|
135 | (1) |
|
6.4 Long Short-Term Memory Networks |
|
|
136 | (2) |
|
|
137 | (1) |
|
6.5 Back Propagation in Neural Networks |
|
|
138 | (2) |
|
6.6 Literature Survey on Neural Networks in Steganography |
|
|
140 | (5) |
|
6.6.1 TS-RNN: Text Steganalysis Based on Recurrent Neural Networks |
|
|
140 | (1) |
|
6.6.2 Generative Text Steganography Based on LSTM Network and Attention Mechanism with Keywords |
|
|
141 | (1) |
|
6.6.3 Graph-Stega: Semantic Controllable Steganographic Text Generation Guided by Knowledge Graph |
|
|
142 | (1) |
|
6.6.4 RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model |
|
|
143 | (1) |
|
6.6.5 Steganalysis and Payload Estimation of Embedding in Pixel Differences Using Neural Networks |
|
|
144 | (1) |
|
6.6.6 Reversible Data Hiding Using Multilayer Perceptron-Based Pixel Prediction |
|
|
144 | (1) |
|
6.6.7 Neural Network-Based Steganography Algorithm for Still Images |
|
|
145 | (1) |
|
6.7 Optimization Algorithms in Neural Networks |
|
|
145 | (6) |
|
|
145 | (1) |
|
|
146 | (1) |
|
6.7.2 Stochastic Gradient Descent |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
6.7.4.1 Mini Batch SGD Issues |
|
|
149 | (1) |
|
6.7.5 Adaptive Gradient Algorithm |
|
|
149 | (2) |
|
|
151 | (6) |
|
|
151 | (6) |
|
7 Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System |
|
|
157 | (12) |
|
|
|
|
157 | (2) |
|
|
159 | (1) |
|
|
160 | (2) |
|
|
162 | (4) |
|
|
166 | (1) |
|
|
167 | (2) |
|
|
168 | (1) |
|
8 Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission |
|
|
169 | (24) |
|
|
|
|
|
|
|
|
|
170 | (2) |
|
|
172 | (8) |
|
|
180 | (2) |
|
8.4 Results and Discussion |
|
|
182 | (4) |
|
|
186 | (7) |
|
|
187 | (6) |
|
9 Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN) |
|
|
193 | (24) |
|
|
|
|
|
|
|
|
|
194 | (1) |
|
|
195 | (1) |
|
9.3 Key Enabling Techniques for 5G |
|
|
196 | (4) |
|
|
200 | (2) |
|
9.5 5G Technologies: Security and Privacy Issues |
|
|
202 | (3) |
|
9.5.1 5G Security Architecture |
|
|
203 | (1) |
|
9.5.2 Deployment Security in 5G Green Network |
|
|
204 | (1) |
|
9.5.3 Protection of Data Integrity |
|
|
204 | (1) |
|
9.5.4 Artificial Intelligence |
|
|
204 | (1) |
|
9.6 5G-GN Assets and Threats |
|
|
205 | (1) |
|
9.7 5G-GN Security Strategies and Deployments |
|
|
205 | (3) |
|
9.8 Risk Analysis of 5G Applications |
|
|
208 | (1) |
|
9.9 Countermeasures Against Security and Privacy Risks |
|
|
209 | (1) |
|
9.9.1 Enhanced Mobile Broadband |
|
|
209 | (1) |
|
9.9.2 Ultra-Reliable Low Latency Communications |
|
|
209 | (1) |
|
9.10 Protecting 5G Green Networks Against Attacks |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
212 | (5) |
|
|
213 | (4) |
|
10 A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology |
|
|
217 | (16) |
|
|
|
|
|
|
218 | (2) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
10.3.1 VMware Workstation |
|
|
222 | (1) |
|
10.4 Green it Using Virtualization |
|
|
222 | (1) |
|
|
223 | (7) |
|
10.5.1 Proposed Secure Virtual Framework |
|
|
225 | (5) |
|
|
230 | (3) |
|
|
230 | (1) |
|
|
230 | (3) |
|
11 Big Data Architecture for Network Security |
|
|
233 | (36) |
|
|
|
|
|
|
|
|
|
11.1 Introduction to Big Data |
|
|
234 | (18) |
|
|
235 | (2) |
|
11.1.2 Architecture of Big Data |
|
|
237 | (1) |
|
11.1.3 Big Data Access Control |
|
|
238 | (1) |
|
11.1.4 Classification of Big Data |
|
|
239 | (1) |
|
|
239 | (1) |
|
11.1.4.2 Unstructured Data |
|
|
240 | (1) |
|
11.1.4.3 Semi-Structured Data |
|
|
240 | (1) |
|
|
241 | (1) |
|
11.1.6 Challenges to Big Data Management |
|
|
241 | (1) |
|
|
242 | (1) |
|
11.1.8 Big Data Hadoop Architecture |
|
|
242 | (1) |
|
|
242 | (1) |
|
11.1.10 Performance Factors |
|
|
243 | (1) |
|
|
244 | (2) |
|
11.1.12 Big Data Security Threats |
|
|
246 | (1) |
|
|
247 | (1) |
|
11.1.14 Non-Relational Databases |
|
|
247 | (1) |
|
11.1.15 Endpoint Vulnerabilities |
|
|
247 | (1) |
|
11.1.16 Data Mining Solutions |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
11.1.19 Importance and Relevance of the Study |
|
|
250 | (1) |
|
11.1.20 Background History |
|
|
250 | (2) |
|
|
252 | (1) |
|
11.2 Technology Used to Big Data |
|
|
252 | (2) |
|
|
252 | (1) |
|
11.2.2 Characteristics of MATLAB |
|
|
253 | (1) |
|
11.2.3 Research Objectives |
|
|
253 | (1) |
|
|
254 | (1) |
|
11.3 Working Process of Techniques |
|
|
254 | (1) |
|
|
254 | (1) |
|
11.3.2 GUI Interface for Client |
|
|
254 | (1) |
|
11.3.3 GUI Interface for Server |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (2) |
|
|
255 | (1) |
|
11.4.2 Process Flow of Proposed Work |
|
|
255 | (1) |
|
|
255 | (2) |
|
11.5 Comparative Analysis |
|
|
257 | (5) |
|
|
257 | (1) |
|
11.5.2 Error Rate Comparison |
|
|
258 | (1) |
|
11.5.3 Packet Size Comparison |
|
|
258 | (1) |
|
11.5.4 Packet Affected Due to Attack |
|
|
258 | (4) |
|
11.6 Conclusion and Future Scope |
|
|
262 | (7) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
264 | (5) |
About the Editors |
|
269 | (2) |
Index |
|
271 | |