![An Interdisciplinary Approach to Modern Network Security](https://img.perlego.com/book-covers/3392564/9781000580655_300_450.webp)
An Interdisciplinary Approach to Modern Network Security
Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le
- 190 Seiten
- English
- ePUB (handyfreundlich)
- Über iOS und Android verfügbar
An Interdisciplinary Approach to Modern Network Security
Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le
Über dieses Buch
An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields.
Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more.
Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.
Häufig gestellte Fragen
Information
Chapter 1 Application of artificial intelligence in cybersecurity A detailed survey on intrusion detection systems
- 1.1 Introduction
- 1.2 Objective of the chapter
- 1.3 Scope of this chapter
- 1.4 System requirements
- 1.5 Background literature
- 1.5.1 Various types of attacks in cybersecurity—IDS
- 1.5.1.1 Malware
- 1.5.1.2 Phishing
- 1.5.1.3 Man-in-the-middle attack
- 1.5.1.4 Denial-of-service attack
- 1.5.1.5 Structured query language (SQL) injection
- 1.5.1.6 Zero-day exploit
- 1.5.1.7 DNS-tunneling
- 1.5.1.8 Other types of attacks in IDS
- 1.5.2 Artificial intelligence for cybersecurity
- 1.5.3 Existing-systems
- 1.5.3.1 Signаture-bаsed IDS
- 1.5.3.2 Аnоmаly-bаsed IDS
- 1.5.1 Various types of attacks in cybersecurity—IDS
- 1.6 Architecture of the project and survey
- 1.6.1 Broad classification of intrusion system
- 1.6.1.1 Host IDS
- 1.6.1.2 Network IDS
- 1.6.1.3 Application IDS
- 1.6.1 Broad classification of intrusion system
- 1.7 Code implementation
- 1.8 Conclusion
- References
1.1 Introduction
- Progressively intellectual,
- Highly adaptable,
- Sufficient to analyze and mitigate against various types of attacks.
- Cybersecurity: The term cybersecurity refers to protecting information, networks, programs, and information, as distinct from unauthorized or unattainable access, destruction, or modification. In the current situation, cybersecurity is incredibly necessary due to some security threats and cyber-attacks. Many corporations develop software packages for information security. This software package protects the information. To secure the information and to protect these systems from virus attack it is important to use Cyber security.
- Cybercrime: An individual or organized group uses the Internet, i.e., computers, Internet, cell phones, various technical devices, etc., to commit an act against the law. This act is known as Cyber-crime. Such people are called cyber attackers. They use various software packages and codes on the Internet to commit crimes.They exploit software package and hardware style vulnerabilities by using malware.Hacking can be a common means to break into the security of secure laptop systems and keep them busy.
- IDS: А rаnge оf actions thаt intrude with the а system’s privacy is саlled а lарtор intrusiоn. The сhаin оf actions must be trасed tо verify the authorization оf the соmрuting system.
- Аssосiаte degree intrusiоn intо а system: Аssосiаte degree intrusiоn саn be а mаliсiоus асtivity thаt соmрrоmises seсurity оver а series оf events within the system. For exаmрle, intrusiоn is а DoS, or an intrusiоn thаt negоtiаtiоns the рrоvisiоn оf аssосiаte degree systems by trafficking а server with а horrific range оf requests.
- Definition: Any action that is not de jure allowed for a user to request of an associate degree system is termed intrusion, and intrusion detection could be a method of police work and tracing inappropriate, and incorrect, or abnormal activity targeted at computing and networking resources.
1.2 Objective of the chapter
- To perform a survey on the existing artificial intelligence method utilized in combating cyber safety.
- To reduce computational complexity, model training time, and fake alarms by using AI techniques
1.3 Scope of this chapter
1.4 System requirements
- Hardware Requirements:
- Processor – Intel Dual core 2.0, Motherboard – Intel DG41, RAM – 2 GB, HDD – 250 GB SATA, Keyboard (USB)
- Software Requirements:
- Browser: Firefox, Microsoft Edge, Google Chrome, etc.
- Operating System: Windows 10 with Core i5 Processor.
- Language: Python-(Implementation)
1.5 Background literature
1.5.1 Various types of attacks in cybersecurity—IDS
1.5.1.1 Malware
- Blocks the correct point of entry to basic units of the Internet (ransom ware)
- Installs machine virus or extra dangerous programs.
- Gets data secretly, using sending information via Winchester drives (spyware)
- Interrupts bound parts and disables the machine
![](https://book-extracts.perlego.com/3392564/images/fig1_1_B-plgo-compressed.webp)
1.5.1.2 Phishing
Inhaltsverzeichnis
- Cover Page
- Half Title Page
- Title Page
- Copyright Page
- Contents
- Preface
- Editors
- Contributors
- Chapter 1 Application of artificial intelligence in cybersecurity A detailed survey on intrusion detection systems
- Chapter 2 IoMT data security approach Blockchain in healthcare
- Chapter 3 Machine learning approach for network intrusion detection systems
- Chapter 4 Deep learning approach for network intrusion detection systems
- Chapter 5 Performance and evaluation of firewalls and security
- Chapter 6 Application of machine learning and deep learning in cybersecurity An innovative approach
- Chapter 7 A modified authentication approach for cloud computing in e-healthcare systems
- Chapter 8 Advanced security system in video surveillance for COVID-19
- Chapter 9 Secure sound and data communication via Li-Fi
- Chapter 10 A novel secured method for rapid data accumulation in energy-aware WSN
- Index