An Interdisciplinary Approach to Modern Network Security
eBook - ePub

An Interdisciplinary Approach to Modern Network Security

Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le

  1. 190 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

An Interdisciplinary Approach to Modern Network Security

Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le

Book details
Book preview
Table of contents
Citations

About This Book

An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields.

Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more.

Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is An Interdisciplinary Approach to Modern Network Security an online PDF/ePUB?
Yes, you can access An Interdisciplinary Approach to Modern Network Security by Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le in PDF and/or ePUB format, as well as other popular books in Informatique & Cybersécurité. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2022
ISBN
9781000580655
Edition
1

Chapter 1 Application of artificial intelligence in cybersecurity A detailed survey on intrusion detection systems

R. Deepalakshmi, R. Vijayalakshmi, C. Sam Ruben, R. Pandiya Rajan and J. Pradeep
Velammal College of Engineering and Technology, Madurai, India
DOI: 10.1201/9781003147176-1
Contents
  1. 1.1 Introduction
  2. 1.2 Objective of the chapter
  3. 1.3 Scope of this chapter
  4. 1.4 System requirements
  5. 1.5 Background literature
    • 1.5.1 Various types of attacks in cybersecurity—IDS
      • 1.5.1.1 Malware
      • 1.5.1.2 Phishing
      • 1.5.1.3 Man-in-the-middle attack
      • 1.5.1.4 Denial-of-service attack
      • 1.5.1.5 Structured query language (SQL) injection
      • 1.5.1.6 Zero-day exploit
      • 1.5.1.7 DNS-tunneling
      • 1.5.1.8 Other types of attacks in IDS
    • 1.5.2 Artificial intelligence for cybersecurity
    • 1.5.3 Existing-systems
      • 1.5.3.1 Signаture-bаsed IDS
      • 1.5.3.2 Аnоmаly-bаsed IDS
  6. 1.6 Architecture of the project and survey
    • 1.6.1 Broad classification of intrusion system
      • 1.6.1.1 Host IDS
      • 1.6.1.2 Network IDS
      • 1.6.1.3 Application IDS
  7. 1.7 Code implementation
  8. 1.8 Conclusion
  9. References

1.1 Introduction

An “Intrusion Detection System” (IDS) is a system that shows a network for activities, attacks, and alerts when an attack is detected. There are a variety of IDS techniques in use these days but a common problem with them is their performance. Various surveys and research have been done concerning this problem using support vector machines and multi-layer artificial intelligence perception. Similarly, supervised learning models, such as vector machines with often associated learning algorithms that are used for analyzing and storing data, are also used for regression analysis and classification in subsequent attacks.
Despite increased demand for network security, currently available solutions were still insufficient to fully protect computer network attacks and Internet rich applications against developing threats, such as cybercrime or DOS attacks from hackers and unauthorized users. It has been more important than ever to create more advanced and secure IDS that are fast, intelligent, user friendly, and efficient.
Previous security technologies, such as user-available authentication, data encryption techniques, and firewalls, are no longer sufficient to withstand advanced intrusions and cyber-attacks. IDS is used to analyze big data because there is a lot of traffic including attacks that are analyzed to check for suspicious and unusual activities and are also successful in doing so. Therefore, IDS helps organizations to defy a large range of attacks.
Attacks are classified through a level of IDS features which demands accepting an “Artificial Intelligence” (AI) or agents to combat these attacks. Similarly, cybersecurity techniques should be:
  1. Progressively intellectual,
  2. Highly adaptable,
  3. Sufficient to analyze and mitigate against various types of attacks.
  • Cybersecurity: The term cybersecurity refers to protecting information, networks, programs, and information, as distinct from unauthorized or unattainable access, destruction, or modification. In the current situation, cybersecurity is incredibly necessary due to some security threats and cyber-attacks. Many corporations develop software packages for information security. This software package protects the information. To secure the information and to protect these systems from virus attack it is important to use Cyber security.
  • Cybercrime: An individual or organized group uses the Internet, i.e., computers, Internet, cell phones, various technical devices, etc., to commit an act against the law. This act is known as Cyber-crime. Such people are called cyber attackers. They use various software packages and codes on the Internet to commit crimes.
    They exploit software package and hardware style vulnerabilities by using malware.
    Hacking can be a common means to break into the security of secure laptop systems and keep them busy.
  • IDS: А rаnge оf actions thаt intrude with the а system’s privacy is саlled а lарtор intrusiоn. The сhаin оf actions must be trасed tо verify the authorization оf the соmрuting system.
  • Аssосiаte degree intrusiоn intо а system: Аssосiаte degree intrusiоn саn be а mаliсiоus асtivity thаt соmрrоmises seсurity оver а series оf events within the system. For exаmрle, intrusiоn is а DoS, or an intrusiоn thаt negоtiаtiоns the рrоvisiоn оf аssосiаte degree systems by trafficking а server with а horrific range оf requests.
  • Definition: Any action that is not de jure allowed for a user to request of an associate degree system is termed intrusion, and intrusion detection could be a method of police work and tracing inappropriate, and incorrect, or abnormal activity targeted at computing and networking resources.

1.2 Objective of the chapter

  • To perform a survey on the existing artificial intelligence method utilized in combating cyber safety.
  • To reduce computational complexity, model training time, and fake alarms by using AI techniques

1.3 Scope of this chapter

This chapter will improve and suggest the direction of research in AI for cybersecurity and provide detailed strategies to researchers who need to adopt new algorithms and techniques to do research and to proceed with their work on the global level in other related openings in artificial intelligence in cybersecurity.

1.4 System requirements

  • Hardware Requirements:
    • Processor – Intel Dual core 2.0, Motherboard – Intel DG41, RAM – 2 GB, HDD – 250 GB SATA, Keyboard (USB)
  • Software Requirements:
    • Browser: Firefox, Microsoft Edge, Google Chrome, etc.
    • Operating System: Windows 10 with Core i5 Processor.
    • Language: Python-(Implementation)

1.5 Background literature

1.5.1 Various types of attacks in cybersecurity—IDS

1.5.1.1 Malware

Malware, alongside spyware, ransom ware, viruses, and worms, may be a recurring term for malicious software systems. A virus breaches a group via a vulnerable condition, when by nature a user taps on a malicious hyperlink or e-mail document, thus installing dangerous software on the user’s machine. Once it is installed in the user’s device, the malware will do the following:
  • Blocks the correct point of entry to basic units of the Internet (ransom ware)
  • Installs machine virus or extra dangerous programs.
  • Gets data secretly, using sending information via Winchester drives (spyware)
  • Interrupts bound parts and disables the machine
(Where the various malware attacks are defined in Figure 1.1).
Figure 1.1 Types of malware attacks.

1.5.1.2 Phishing

The act of inflicting flawed conversations that appear to come back again from an honorable deliver is Phishing, which is so often via e-mail. The usage is to rob delicate statistics such as master-card credentials (login data) or to inject a virus into the user’s device. Phishing is a co...

Table of contents

  1. Cover Page
  2. Half Title Page
  3. Title Page
  4. Copyright Page
  5. Contents
  6. Preface
  7. Editors
  8. Contributors
  9. Chapter 1 Application of artificial intelligence in cybersecurity A detailed survey on intrusion detection systems
  10. Chapter 2 IoMT data security approach Blockchain in healthcare
  11. Chapter 3 Machine learning approach for network intrusion detection systems
  12. Chapter 4 Deep learning approach for network intrusion detection systems
  13. Chapter 5 Performance and evaluation of firewalls and security
  14. Chapter 6 Application of machine learning and deep learning in cybersecurity An innovative approach
  15. Chapter 7 A modified authentication approach for cloud computing in e-healthcare systems
  16. Chapter 8 Advanced security system in video surveillance for COVID-19
  17. Chapter 9 Secure sound and data communication via Li-Fi
  18. Chapter 10 A novel secured method for rapid data accumulation in energy-aware WSN
  19. Index
Citation styles for An Interdisciplinary Approach to Modern Network Security

APA 6 Citation

Pramanik, S., Sharma, A., Bhatia, S., & Le, D.-N. (2022). An Interdisciplinary Approach to Modern Network Security (1st ed.). CRC Press. Retrieved from https://www.perlego.com/book/3392564/an-interdisciplinary-approach-to-modern-network-security-pdf (Original work published 2022)

Chicago Citation

Pramanik, Sabyasachi, Anand Sharma, Surbhi Bhatia, and Dac-Nhuong Le. (2022) 2022. An Interdisciplinary Approach to Modern Network Security. 1st ed. CRC Press. https://www.perlego.com/book/3392564/an-interdisciplinary-approach-to-modern-network-security-pdf.

Harvard Citation

Pramanik, S. et al. (2022) An Interdisciplinary Approach to Modern Network Security. 1st edn. CRC Press. Available at: https://www.perlego.com/book/3392564/an-interdisciplinary-approach-to-modern-network-security-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Pramanik, Sabyasachi et al. An Interdisciplinary Approach to Modern Network Security. 1st ed. CRC Press, 2022. Web. 15 Oct. 2022.