An Interdisciplinary Approach to Modern Network Security
eBook - ePub

An Interdisciplinary Approach to Modern Network Security

Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le

  1. 190 páginas
  2. English
  3. ePUB (apto para móviles)
  4. Disponible en iOS y Android
eBook - ePub

An Interdisciplinary Approach to Modern Network Security

Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le

Detalles del libro
Vista previa del libro
Índice
Citas

Información del libro

An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields.

Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more.

Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.

Preguntas frecuentes

¿Cómo cancelo mi suscripción?
Simplemente, dirígete a la sección ajustes de la cuenta y haz clic en «Cancelar suscripción». Así de sencillo. Después de cancelar tu suscripción, esta permanecerá activa el tiempo restante que hayas pagado. Obtén más información aquí.
¿Cómo descargo los libros?
Por el momento, todos nuestros libros ePub adaptables a dispositivos móviles se pueden descargar a través de la aplicación. La mayor parte de nuestros PDF también se puede descargar y ya estamos trabajando para que el resto también sea descargable. Obtén más información aquí.
¿En qué se diferencian los planes de precios?
Ambos planes te permiten acceder por completo a la biblioteca y a todas las funciones de Perlego. Las únicas diferencias son el precio y el período de suscripción: con el plan anual ahorrarás en torno a un 30 % en comparación con 12 meses de un plan mensual.
¿Qué es Perlego?
Somos un servicio de suscripción de libros de texto en línea que te permite acceder a toda una biblioteca en línea por menos de lo que cuesta un libro al mes. Con más de un millón de libros sobre más de 1000 categorías, ¡tenemos todo lo que necesitas! Obtén más información aquí.
¿Perlego ofrece la función de texto a voz?
Busca el símbolo de lectura en voz alta en tu próximo libro para ver si puedes escucharlo. La herramienta de lectura en voz alta lee el texto en voz alta por ti, resaltando el texto a medida que se lee. Puedes pausarla, acelerarla y ralentizarla. Obtén más información aquí.
¿Es An Interdisciplinary Approach to Modern Network Security un PDF/ePUB en línea?
Sí, puedes acceder a An Interdisciplinary Approach to Modern Network Security de Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le en formato PDF o ePUB, así como a otros libros populares de Informatique y Cybersécurité. Tenemos más de un millón de libros disponibles en nuestro catálogo para que explores.

Información

Editorial
CRC Press
Año
2022
ISBN
9781000580655
Edición
1
Categoría
Informatique
Categoría
Cybersécurité

Chapter 1 Application of artificial intelligence in cybersecurity A detailed survey on intrusion detection systems

R. Deepalakshmi, R. Vijayalakshmi, C. Sam Ruben, R. Pandiya Rajan and J. Pradeep
Velammal College of Engineering and Technology, Madurai, India
DOI: 10.1201/9781003147176-1
Contents
  1. 1.1 Introduction
  2. 1.2 Objective of the chapter
  3. 1.3 Scope of this chapter
  4. 1.4 System requirements
  5. 1.5 Background literature
    • 1.5.1 Various types of attacks in cybersecurity—IDS
      • 1.5.1.1 Malware
      • 1.5.1.2 Phishing
      • 1.5.1.3 Man-in-the-middle attack
      • 1.5.1.4 Denial-of-service attack
      • 1.5.1.5 Structured query language (SQL) injection
      • 1.5.1.6 Zero-day exploit
      • 1.5.1.7 DNS-tunneling
      • 1.5.1.8 Other types of attacks in IDS
    • 1.5.2 Artificial intelligence for cybersecurity
    • 1.5.3 Existing-systems
      • 1.5.3.1 Signаture-bаsed IDS
      • 1.5.3.2 Аnоmаly-bаsed IDS
  6. 1.6 Architecture of the project and survey
    • 1.6.1 Broad classification of intrusion system
      • 1.6.1.1 Host IDS
      • 1.6.1.2 Network IDS
      • 1.6.1.3 Application IDS
  7. 1.7 Code implementation
  8. 1.8 Conclusion
  9. References

1.1 Introduction

An “Intrusion Detection System” (IDS) is a system that shows a network for activities, attacks, and alerts when an attack is detected. There are a variety of IDS techniques in use these days but a common problem with them is their performance. Various surveys and research have been done concerning this problem using support vector machines and multi-layer artificial intelligence perception. Similarly, supervised learning models, such as vector machines with often associated learning algorithms that are used for analyzing and storing data, are also used for regression analysis and classification in subsequent attacks.
Despite increased demand for network security, currently available solutions were still insufficient to fully protect computer network attacks and Internet rich applications against developing threats, such as cybercrime or DOS attacks from hackers and unauthorized users. It has been more important than ever to create more advanced and secure IDS that are fast, intelligent, user friendly, and efficient.
Previous security technologies, such as user-available authentication, data encryption techniques, and firewalls, are no longer sufficient to withstand advanced intrusions and cyber-attacks. IDS is used to analyze big data because there is a lot of traffic including attacks that are analyzed to check for suspicious and unusual activities and are also successful in doing so. Therefore, IDS helps organizations to defy a large range of attacks.
Attacks are classified through a level of IDS features which demands accepting an “Artificial Intelligence” (AI) or agents to combat these attacks. Similarly, cybersecurity techniques should be:
  1. Progressively intellectual,
  2. Highly adaptable,
  3. Sufficient to analyze and mitigate against various types of attacks.
  • Cybersecurity: The term cybersecurity refers to protecting information, networks, programs, and information, as distinct from unauthorized or unattainable access, destruction, or modification. In the current situation, cybersecurity is incredibly necessary due to some security threats and cyber-attacks. Many corporations develop software packages for information security. This software package protects the information. To secure the information and to protect these systems from virus attack it is important to use Cyber security.
  • Cybercrime: An individual or organized group uses the Internet, i.e., computers, Internet, cell phones, various technical devices, etc., to commit an act against the law. This act is known as Cyber-crime. Such people are called cyber attackers. They use various software packages and codes on the Internet to commit crimes.
    They exploit software package and hardware style vulnerabilities by using malware.
    Hacking can be a common means to break into the security of secure laptop systems and keep them busy.
  • IDS: А rаnge оf actions thаt intrude with the а system’s privacy is саlled а lарtор intrusiоn. The сhаin оf actions must be trасed tо verify the authorization оf the соmрuting system.
  • Аssосiаte degree intrusiоn intо а system: Аssосiаte degree intrusiоn саn be а mаliсiоus асtivity thаt соmрrоmises seсurity оver а series оf events within the system. For exаmрle, intrusiоn is а DoS, or an intrusiоn thаt negоtiаtiоns the рrоvisiоn оf аssосiаte degree systems by trafficking а server with а horrific range оf requests.
  • Definition: Any action that is not de jure allowed for a user to request of an associate degree system is termed intrusion, and intrusion detection could be a method of police work and tracing inappropriate, and incorrect, or abnormal activity targeted at computing and networking resources.

1.2 Objective of the chapter

  • To perform a survey on the existing artificial intelligence method utilized in combating cyber safety.
  • To reduce computational complexity, model training time, and fake alarms by using AI techniques

1.3 Scope of this chapter

This chapter will improve and suggest the direction of research in AI for cybersecurity and provide detailed strategies to researchers who need to adopt new algorithms and techniques to do research and to proceed with their work on the global level in other related openings in artificial intelligence in cybersecurity.

1.4 System requirements

  • Hardware Requirements:
    • Processor – Intel Dual core 2.0, Motherboard – Intel DG41, RAM – 2 GB, HDD – 250 GB SATA, Keyboard (USB)
  • Software Requirements:
    • Browser: Firefox, Microsoft Edge, Google Chrome, etc.
    • Operating System: Windows 10 with Core i5 Processor.
    • Language: Python-(Implementation)

1.5 Background literature

1.5.1 Various types of attacks in cybersecurity—IDS

1.5.1.1 Malware

Malware, alongside spyware, ransom ware, viruses, and worms, may be a recurring term for malicious software systems. A virus breaches a group via a vulnerable condition, when by nature a user taps on a malicious hyperlink or e-mail document, thus installing dangerous software on the user’s machine. Once it is installed in the user’s device, the malware will do the following:
  • Blocks the correct point of entry to basic units of the Internet (ransom ware)
  • Installs machine virus or extra dangerous programs.
  • Gets data secretly, using sending information via Winchester drives (spyware)
  • Interrupts bound parts and disables the machine
(Where the various malware attacks are defined in Figure 1.1).
Figure 1.1 Types of malware attacks.

1.5.1.2 Phishing

The act of inflicting flawed conversations that appear to come back again from an honorable deliver is Phishing, which is so often via e-mail. The usage is to rob delicate statistics such as master-card credentials (login data) or to inject a virus into the user’s device. Phishing is a co...

Índice

  1. Cover Page
  2. Half Title Page
  3. Title Page
  4. Copyright Page
  5. Contents
  6. Preface
  7. Editors
  8. Contributors
  9. Chapter 1 Application of artificial intelligence in cybersecurity A detailed survey on intrusion detection systems
  10. Chapter 2 IoMT data security approach Blockchain in healthcare
  11. Chapter 3 Machine learning approach for network intrusion detection systems
  12. Chapter 4 Deep learning approach for network intrusion detection systems
  13. Chapter 5 Performance and evaluation of firewalls and security
  14. Chapter 6 Application of machine learning and deep learning in cybersecurity An innovative approach
  15. Chapter 7 A modified authentication approach for cloud computing in e-healthcare systems
  16. Chapter 8 Advanced security system in video surveillance for COVID-19
  17. Chapter 9 Secure sound and data communication via Li-Fi
  18. Chapter 10 A novel secured method for rapid data accumulation in energy-aware WSN
  19. Index
Estilos de citas para An Interdisciplinary Approach to Modern Network Security

APA 6 Citation

Pramanik, S., Sharma, A., Bhatia, S., & Le, D.-N. (2022). An Interdisciplinary Approach to Modern Network Security (1st ed.). CRC Press. Retrieved from https://www.perlego.com/book/3392564/an-interdisciplinary-approach-to-modern-network-security-pdf (Original work published 2022)

Chicago Citation

Pramanik, Sabyasachi, Anand Sharma, Surbhi Bhatia, and Dac-Nhuong Le. (2022) 2022. An Interdisciplinary Approach to Modern Network Security. 1st ed. CRC Press. https://www.perlego.com/book/3392564/an-interdisciplinary-approach-to-modern-network-security-pdf.

Harvard Citation

Pramanik, S. et al. (2022) An Interdisciplinary Approach to Modern Network Security. 1st edn. CRC Press. Available at: https://www.perlego.com/book/3392564/an-interdisciplinary-approach-to-modern-network-security-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Pramanik, Sabyasachi et al. An Interdisciplinary Approach to Modern Network Security. 1st ed. CRC Press, 2022. Web. 15 Oct. 2022.