Cybersecurity of Digital Service Chains : : Challenges, Methodologies, and Tools.

Saved in:
Bibliographic Details
Superior document:Lecture Notes in Computer Science Series ; v.13300
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2022.
{copy}2022.
Year of Publication:2022
Edition:1st ed.
Language:English
Series:Lecture Notes in Computer Science Series
Online Access:
Physical Description:1 online resource (267 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 07074nam a22004453i 4500
001 5006949311
003 MiAaPQ
005 20240229073845.0
006 m o d |
007 cr cnu||||||||
008 240229s2022 xx o ||||0 eng d
020 |a 9783031040368  |q (electronic bk.) 
020 |z 9783031040351 
035 |a (MiAaPQ)5006949311 
035 |a (Au-PeEL)EBL6949311 
035 |a (OCoLC)1310782928 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
050 4 |a TK5105.5-5105.9 
100 1 |a Kołodziej, Joanna. 
245 1 0 |a Cybersecurity of Digital Service Chains :  |b Challenges, Methodologies, and Tools. 
250 |a 1st ed. 
264 1 |a Cham :  |b Springer International Publishing AG,  |c 2022. 
264 4 |c {copy}2022. 
300 |a 1 online resource (267 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science Series ;  |v v.13300 
505 0 |a Intro -- Preface -- Acknowledgements -- Contents -- A Reference Architecture for Management of Security Operations in Digital Service Chains -- 1 Introduction -- 2 Related Work -- 3 The GUARD Framework -- 4 GUARD Platform -- 4.1 Security Analytics Pipelines -- 4.2 Context-Broker Manager -- 4.3 Security Controller -- 4.4 Dashboard -- 5 GUARD Operation -- 5.1 Discovery and Management of Security Capabilities -- 5.2 Identity Management and Access Control -- 5.3 Workflows -- 6 Validation and Performance Analysis -- 6.1 Data Handling Pipeline -- 6.2 Control Abstraction -- 7 Conclusion -- References -- Monitoring Network Flows in Containerized Environments -- 1 Introduction -- 2 Flow Monitoring -- 2.1 Existing Tools and Limitations -- 2.2 The Extended Berkeley Packet Filter -- 2.3 eBPF for Monitoring, Inspection, and Enforcement -- 3 A New Flow Monitoring Tool: bpfFlowMon -- 4 Evaluation -- 4.1 Accuracy -- 4.2 Performance and Overhead -- 5 Limitations of the Proposed Approach -- 6 Related Work -- 7 Conclusion -- References -- Intelligent Transportation Systems - Models, Challenges, Security Aspects -- 1 Introduction -- 2 Intelligent Transportation Models -- 2.1 Examples of the Traffic Flow ITS Models -- 2.2 ICT Supporting Models for Traffic Flow -- 2.3 ITS e-Business Aspects and Models -- 3 Methods of Detection of Anomalies, Attacks and Threats in ICT Systems -- 3.1 Attack Technique and Thread Impact Criteria -- 3.2 Known and Unknown Attacks -- 4 ITS Practical Example - Wobcom Smart City Project with GUARD Support -- 4.1 Security Aspects of ITS Integration with the GUARD Project -- 5 Conclusions -- References -- NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic -- 1 Introduction -- 2 Anomaly Detection with Machine Learning -- 2.1 Machine Learning Methods -- 2.2 Attack Emulation -- 2.3 Adjusting Detection Threshold. 
505 8 |a 2.4 Ensemble Learning -- 3 The NAD Architecture -- 3.1 Modules -- 3.2 Deployment schemes -- 3.3 Integration with the Real Network Infrastructure -- 4 Experiments -- 4.1 Repeatability -- 4.2 Unknown DoS Detection -- 4.3 Ensemble Models -- 4.4 Threshold Adjustment -- 5 Conclusions -- References -- Detecting Unknown Cyber Security Attacks Through System Behavior Analysis -- 1 Introduction -- 2 Log Data Analysis for Security Purposes -- 3 Incremental Character-Based Event Processing -- 4 Creating Cluster Templates -- 5 Learning Data Structures and Creating Tree-Based Parsers -- 6 System Behavior Modeling and ML-Based Anomaly Detection -- 7 Conclusion -- References -- Signature-Based Detection of Botnet DDoS Attacks -- 1 Introduction -- 2 PGA Signatures -- 2.1 Network Telescope -- 2.2 DDoS Seen Through Network Telescope -- 2.3 Botnets -- 2.4 Packet Generation Algorithm -- 2.5 Generating PGA Signatures -- 3 PGA Filter -- 3.1 Extended Barkeley Packet Filter -- 3.2 PGA Filter Architecture -- 3.3 PGA Filter Integration in the GUARD Framework -- 4 Conclusion -- References -- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation -- 1 Introduction -- 2 Entities and Operations -- 2.1 Overview -- 2.2 Alerts -- 2.3 Alert Groups -- 2.4 Meta-alerts -- 3 Application Example -- 3.1 CTI Process Flow -- 3.2 Data Generation -- 3.3 CTI Dashboard -- 4 Conclusion -- References -- Blockchain-Based Task and Information Management in Computational Cloud Systems -- 1 Introduction -- 2 Blockchain Backgrounds -- 2.1 Blockchain Network -- 2.2 Blockchain Components, Protocols and Algorithms -- 2.3 Consensus Models -- 2.4 Blockchain Taxonomies -- 2.5 Security in BC Networks -- 2.6 Blockchain Usecases -- 3 Security Criterion in Scheduling and Resource Allocation Problems in Computational Clouds. 
505 8 |a 3.1 Security-Aware Cloud Schedulers - A Short Survey of Recent Schedulers -- 4 Blockchain-Based Secure Cloud Scheduler -- 4.1 Clients and Cloud Service Providers -- 4.2 Pool of Requests -- 4.3 Nodes and Transactions -- 4.4 Chain of Blocks -- 4.5 Proof of Schedule - Generalized Stackelberg Game -- 4.6 Blocks Mining -- 4.7 Profits for Task Schedulers -- 4.8 Evaluation Examples -- 5 Conclusions -- References -- Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them? -- 1 Introduction -- 2 Contemporary Ethical Issues in Cybersecurity -- 2.1 Data Privacy of Users -- 2.2 Security Breaches and Risks. Contemplating the Idea of "Ethical Hacking" -- 2.3 New Risks in Developing Fields - IoT and Cloud Computing -- 2.4 Risks While Testing New Technology -- 3 Required Measures to Ensure Ethical Compliance -- 3.1 Implementing Organisational Measures to Ensure Ethical Compliance -- 3.2 Carrying Out an Impact Assessment -- 3.3 Adopting Privacy Enhancing Technologies -- 4 Conclusions -- References -- A Discussion on Ethical Cybersecurity Issues in Digital Service Chains -- 1 Introduction -- 2 Background and Related Work -- 2.1 Cybersecurity and Information Security -- 2.2 Data Commercialization -- 2.3 Digital Service Chains -- 2.4 Ethics in Cybersecurity -- 2.5 Related Work -- 3 Methodology -- 4 Ethical Issues -- 4.1 Content Creation -- 4.2 Aggregation -- 4.3 Distribution -- 4.4 Data Transport -- 4.5 Digital Experience -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Author Index. 
588 |a Description based on publisher supplied metadata and other sources. 
590 |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.  
655 4 |a Electronic books. 
700 1 |a Repetto, Matteo. 
700 1 |a Duzha, Armend. 
776 0 8 |i Print version:  |a Kołodziej, Joanna  |t Cybersecurity of Digital Service Chains  |d Cham : Springer International Publishing AG,c2022  |z 9783031040351 
797 2 |a ProQuest (Firm) 
830 0 |a Lecture Notes in Computer Science Series 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6949311  |z Click to View