An Interdisciplinary Approach to Modern Network Security
eBook - ePub

An Interdisciplinary Approach to Modern Network Security

Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le

  1. 190 pages
  2. English
  3. ePUB (adapté aux mobiles)
  4. Disponible sur iOS et Android
eBook - ePub

An Interdisciplinary Approach to Modern Network Security

Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le

DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations

À propos de ce livre

An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields.

Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more.

Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que An Interdisciplinary Approach to Modern Network Security est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  An Interdisciplinary Approach to Modern Network Security par Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Informatique et CybersĂ©curitĂ©. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Éditeur
CRC Press
Année
2022
ISBN
9781000580655
Édition
1

Chapter 1 Application of artificial intelligence in cybersecurity A detailed survey on intrusion detection systems

R. Deepalakshmi, R. Vijayalakshmi, C. Sam Ruben, R. Pandiya Rajan and J. Pradeep
Velammal College of Engineering and Technology, Madurai, India
DOI: 10.1201/9781003147176-1
Contents
  1. 1.1 Introduction
  2. 1.2 Objective of the chapter
  3. 1.3 Scope of this chapter
  4. 1.4 System requirements
  5. 1.5 Background literature
    • 1.5.1 Various types of attacks in cybersecurity—IDS
      • 1.5.1.1 Malware
      • 1.5.1.2 Phishing
      • 1.5.1.3 Man-in-the-middle attack
      • 1.5.1.4 Denial-of-service attack
      • 1.5.1.5 Structured query language (SQL) injection
      • 1.5.1.6 Zero-day exploit
      • 1.5.1.7 DNS-tunneling
      • 1.5.1.8 Other types of attacks in IDS
    • 1.5.2 Artificial intelligence for cybersecurity
    • 1.5.3 Existing-systems
      • 1.5.3.1 SignĐ°ture-bĐ°sed IDS
      • 1.5.3.2 АnĐŸmĐ°ly-bĐ°sed IDS
  6. 1.6 Architecture of the project and survey
    • 1.6.1 Broad classification of intrusion system
      • 1.6.1.1 Host IDS
      • 1.6.1.2 Network IDS
      • 1.6.1.3 Application IDS
  7. 1.7 Code implementation
  8. 1.8 Conclusion
  9. References

1.1 Introduction

An “Intrusion Detection System” (IDS) is a system that shows a network for activities, attacks, and alerts when an attack is detected. There are a variety of IDS techniques in use these days but a common problem with them is their performance. Various surveys and research have been done concerning this problem using support vector machines and multi-layer artificial intelligence perception. Similarly, supervised learning models, such as vector machines with often associated learning algorithms that are used for analyzing and storing data, are also used for regression analysis and classification in subsequent attacks.
Despite increased demand for network security, currently available solutions were still insufficient to fully protect computer network attacks and Internet rich applications against developing threats, such as cybercrime or DOS attacks from hackers and unauthorized users. It has been more important than ever to create more advanced and secure IDS that are fast, intelligent, user friendly, and efficient.
Previous security technologies, such as user-available authentication, data encryption techniques, and firewalls, are no longer sufficient to withstand advanced intrusions and cyber-attacks. IDS is used to analyze big data because there is a lot of traffic including attacks that are analyzed to check for suspicious and unusual activities and are also successful in doing so. Therefore, IDS helps organizations to defy a large range of attacks.
Attacks are classified through a level of IDS features which demands accepting an “Artificial Intelligence” (AI) or agents to combat these attacks. Similarly, cybersecurity techniques should be:
  1. Progressively intellectual,
  2. Highly adaptable,
  3. Sufficient to analyze and mitigate against various types of attacks.
  • Cybersecurity: The term cybersecurity refers to protecting information, networks, programs, and information, as distinct from unauthorized or unattainable access, destruction, or modification. In the current situation, cybersecurity is incredibly necessary due to some security threats and cyber-attacks. Many corporations develop software packages for information security. This software package protects the information. To secure the information and to protect these systems from virus attack it is important to use Cyber security.
  • Cybercrime: An individual or organized group uses the Internet, i.e., computers, Internet, cell phones, various technical devices, etc., to commit an act against the law. This act is known as Cyber-crime. Such people are called cyber attackers. They use various software packages and codes on the Internet to commit crimes.
    They exploit software package and hardware style vulnerabilities by using malware.
    Hacking can be a common means to break into the security of secure laptop systems and keep them busy.
  • IDS: А rĐ°nge ĐŸf actions thĐ°t intrude with the Đ° system’s privacy is саlled Đ° lарtĐŸŃ€ intrusiĐŸn. The сhĐ°in ĐŸf actions must be trасed tĐŸ verify the authorization ĐŸf the ŃĐŸmрuting system.
  • АssĐŸŃiĐ°te degree intrusiĐŸn intĐŸ Đ° system: АssĐŸŃiĐ°te degree intrusiĐŸn саn be Đ° mĐ°liсiĐŸus асtivity thĐ°t ŃĐŸmрrĐŸmises seсurity ĐŸver Đ° series ĐŸf events within the system. For exĐ°mрle, intrusiĐŸn is Đ° DoS, or an intrusiĐŸn thĐ°t negĐŸtiĐ°tiĐŸns the рrĐŸvisiĐŸn ĐŸf Đ°ssĐŸŃiĐ°te degree systems by trafficking Đ° server with Đ° horrific range ĐŸf requests.
  • Definition: Any action that is not de jure allowed for a user to request of an associate degree system is termed intrusion, and intrusion detection could be a method of police work and tracing inappropriate, and incorrect, or abnormal activity targeted at computing and networking resources.

1.2 Objective of the chapter

  • To perform a survey on the existing artificial intelligence method utilized in combating cyber safety.
  • To reduce computational complexity, model training time, and fake alarms by using AI techniques

1.3 Scope of this chapter

This chapter will improve and suggest the direction of research in AI for cybersecurity and provide detailed strategies to researchers who need to adopt new algorithms and techniques to do research and to proceed with their work on the global level in other related openings in artificial intelligence in cybersecurity.

1.4 System requirements

  • Hardware Requirements:
    • Processor – Intel Dual core 2.0, Motherboard – Intel DG41, RAM – 2 GB, HDD – 250 GB SATA, Keyboard (USB)
  • Software Requirements:
    • Browser: Firefox, Microsoft Edge, Google Chrome, etc.
    • Operating System: Windows 10 with Core i5 Processor.
    • Language: Python-(Implementation)

1.5 Background literature

1.5.1 Various types of attacks in cybersecurity—IDS

1.5.1.1 Malware

Malware, alongside spyware, ransom ware, viruses, and worms, may be a recurring term for malicious software systems. A virus breaches a group via a vulnerable condition, when by nature a user taps on a malicious hyperlink or e-mail document, thus installing dangerous software on the user’s machine. Once it is installed in the user’s device, the malware will do the following:
  • Blocks the correct point of entry to basic units of the Internet (ransom ware)
  • Installs machine virus or extra dangerous programs.
  • Gets data secretly, using sending information via Winchester drives (spyware)
  • Interrupts bound parts and disables the machine
(Where the various malware attacks are defined in Figure 1.1).
Figure 1.1 Types of malware attacks.

1.5.1.2 Phishing

The act of inflicting flawed conversations that appear to come back again from an honorable deliver is Phishing, which is so often via e-mail. The usage is to rob delicate statistics such as master-card credentials (login data) or to inject a virus into the user’s device. Phishing is a co...

Table des matiĂšres

  1. Cover Page
  2. Half Title Page
  3. Title Page
  4. Copyright Page
  5. Contents
  6. Preface
  7. Editors
  8. Contributors
  9. Chapter 1 Application of artificial intelligence in cybersecurity A detailed survey on intrusion detection systems
  10. Chapter 2 IoMT data security approach Blockchain in healthcare
  11. Chapter 3 Machine learning approach for network intrusion detection systems
  12. Chapter 4 Deep learning approach for network intrusion detection systems
  13. Chapter 5 Performance and evaluation of firewalls and security
  14. Chapter 6 Application of machine learning and deep learning in cybersecurity An innovative approach
  15. Chapter 7 A modified authentication approach for cloud computing in e-healthcare systems
  16. Chapter 8 Advanced security system in video surveillance for COVID-19
  17. Chapter 9 Secure sound and data communication via Li-Fi
  18. Chapter 10 A novel secured method for rapid data accumulation in energy-aware WSN
  19. Index
Normes de citation pour An Interdisciplinary Approach to Modern Network Security

APA 6 Citation

Pramanik, S., Sharma, A., Bhatia, S., & Le, D.-N. (2022). An Interdisciplinary Approach to Modern Network Security (1st ed.). CRC Press. Retrieved from https://www.perlego.com/book/3392564/an-interdisciplinary-approach-to-modern-network-security-pdf (Original work published 2022)

Chicago Citation

Pramanik, Sabyasachi, Anand Sharma, Surbhi Bhatia, and Dac-Nhuong Le. (2022) 2022. An Interdisciplinary Approach to Modern Network Security. 1st ed. CRC Press. https://www.perlego.com/book/3392564/an-interdisciplinary-approach-to-modern-network-security-pdf.

Harvard Citation

Pramanik, S. et al. (2022) An Interdisciplinary Approach to Modern Network Security. 1st edn. CRC Press. Available at: https://www.perlego.com/book/3392564/an-interdisciplinary-approach-to-modern-network-security-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Pramanik, Sabyasachi et al. An Interdisciplinary Approach to Modern Network Security. 1st ed. CRC Press, 2022. Web. 15 Oct. 2022.