Handbook of Research on Threat Detection and Countermeasures in Network Security
Handbook of Research on Threat Detection and Countermeasures in Network Security
Editor/Author
Al-Hamami, Alaa Hussein and Waleed al-Saadoon, Ghossoon M.
Publication Year: 2015
Publisher: IGI Global
Single-User Purchase Price:
$325.00

Unlimited-User Purchase Price:
$487.50
ISBN: 978-1-4666-6583-5
Category: Technology & Engineering - Technology
Image Count:
142
Book Status: Available
Table of Contents
The Handbook of Research on Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source.
Table of Contents
- Dedication
- Editorial Advisory Board
- List of Reviewers
- Preface
- Acknowledgment
- Chapter 1: Security Concepts, Developments, and Future Trends
- ABSTRACT
- INTRODUCTION
- BASIC PRINCIPLES IN SECURITY SYSTEM DESIGN
- PROTECTION SYSTEM DESIGN
- SECURITY APPLICATIONS
- SECURITY ALGORITHMS
- NEW SECURITY DIRECTIONS
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 2: Enhance Network Intrusion Detection System by Exploiting BR Algorithm as an Optimal Feature Selection
- ABSTRACT
- INTRODUCTION
- LITERATURE REVIEW
- ANALYSIS FOR CRITICAL POINTS IN CURRENT NIDS
- PROPOSAL OF WWNIDS
- MODERN KDD DATASET (VACCINATE SESSIONS AND FEATURES)
- MODERN DATASET PREPROCESSING
- CWDS DESCRIPTION
- FEATURE SELECTION (PROPOSE BR RANKING METHOD)
- WWNIDS CLASSIFIER CONSTRUCTING
- EXPERIMENTAL WORK AND RESULTS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 3: Automatic Intrusion Detection and Secret Multi Agent Preservation Using Authentication Measurement Network Threat
- ABSTRACT
- INTRODUCTION
- NETWORK SECURITY ISSUES
- COMPUTER NETWORK SECURITY
- APPLICATIONS OF AGENT
- AGENT-BASED DEVELOPMENT ENVIRONMENT
- CLASSIFICATION OF INTRUSION DETECTION SYSTEM
- INTRUSION PREVENTION
- AGENT SECURITY
- EXAMPLE OF AUTOMATIC INTRUSION DETECTION AND SECRET PRESERVATION MULTI AGENT USING AUTHENTICATION MEASUREMENT NETWORK THREAT
- PROPOSED SECURITY MULTI AGENT DISTRIBUTED SYSTEM
- CONCLUSION
- SUGGESTIONS FOR FUTURE WORKS
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 4: Real Time Internal Intrusion Detection
- ABSTRACT
- INTRODUCTION
- RELATED WORK
- INTRODUCTION TO THE INTRUSION DETECTION SYSTEM (IDS)
- THREAT WEBSITE
- PURPOSE OF THE DEVELOPMENT OF THE SENSORS
- CONCLUSION
- SUGGESTIONS FOR FUTURE WORK
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 5: Authentication Model for Enterprise Resource Planning Network
- ABSTRACT
- INTRODUCTION
- ERP SYSTEMS AND APPLICATIONS
- SECURITY IN ERP
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 6: Cryptographic Hash Function
- ABSTRACT
- INTRODUCTION
- CLASSIFICATION, PROPORITIES, CONSTRUCTIONS, AND ATTACKS OF HASH FUNCTIONS
- HASH FUNCTIONS APPLICATIONS
- AN OVERVIEW OF A SELECTED HASH FUNCTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 7: Crime Profiling System
- ABSTRACT
- INTRODUCTION
- BACKGROUND
- SYNTACTIC ANALYSIS
- CRIME PROFILING SYSTEM (CPS)
- EXPERIMENTS
- EVALUATION
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 8: Proposals to Win the Battle Against Cyber Crime
- ABSTRACT
- INTRODUCTION
- THE HISTORY OF CYBERCRIME
- CLASSIFICATION OF CYBER
- CYBER CRIME METHODOLOGY
- CYBER CRIME EXISTENCE
- CYBER CRIME COMMITING
- TYPES OF CYBERCRIME
- CYBERCRIME AND THE LAW
- THE CYBER SECURITY PROBLEMS
- THE PROPOSED SOLUTIONS
- THE FUTURE TRENDS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 9: Cyber Crimes
- ABSTRACT
- INTRODUCTION
- CLASSES OF MAJOR CYBER CRIMES, USED TOOLS AND IMPLICATION
- BRIEF DESCRIPTION OF CYBER CRIMES WITH BRIEF REMARKS ABOUT THE DEFENSE MECHANISM
- ENGINEERING A CYBER CRIME
- CONCLUDING REMARKS
- ACKNOWLEDGMENT
- REFERENCES
- KEY TERM AND DEFINITIONS
- Chapter 10: Cyber Space Security Assessment Case Study
- ABSTRACT
- INTRODUCTION
- LITERATURE REVIEW
- DATA MINING FRAMEWORKS
- DISCUSSION
- CYBER TERRORIST ATTACKS
- WHEEL SECURITY PROTECTION
- ANALYSIS OF THE RESULTS
- CONCLUSION
- FUTURE WORK
- REFRENCES
- Chapter 11: Biometric Security
- ABSTRACT
- INTRODUCTION
- BACKGROUND OF BIOMETRIC SECURITY
- FOCUS OF THE CHAPTER
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 12: Data Hiding Schemes Based on Singular Value Decomposition
- ABSTRACT
- INTRODUCTION
- SINGULAR VALUE DECOMPOSITION (SVD)
- DEFINITION OF SVD
- COMPUTING SVD
- SVD IMAGE PROPERTIES
- WATERMARK
- WATERMARK PROPERTIES
- AUDIO WATERMARK
- IMAGE WATERMARKING
- VIDEO WATERMARKING
- HYBRID SVD
- STEGANOGRAPHY
- STEGANALYSIS
- IMAGE ENCRYPTION
- SVD PREVIOUS RESEARCH
- CONCLUSION
- REFERENCES
- ADDITIONAL READING
- KEY TERMS AND DEFINITIONS
- Chapter 13: Malay Language Text-Based Anti-Spam System Using Neural Network
- ABSTRACT
- INTRODUCTION
- BACK-PROPAGATION NEURAL NETWORK CLASSIFICATION
- DATA COLLECTIONS
- EVALUATION OF BACK-PROPAGATION NEURAL NETWORK TECHNIQUE
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 14: Virtualization Technology and Security Challenges
- ABSTRACT
- INTRODUCTION
- SERVER CONSOLIDATION
- DESIGN DESCRIPTION
- BENEFITS OF VIRTUALIZATION
- DRAWBACKS OF VIRTUALIZATION
- METHODOLOGY
- SETUP VIRTUALIZATION MECHANIZE
- IMPLEMENTATION
- TESTING AND FINDINGS
- CONCLUSION
- FUTURE WORKS
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 15: The Impact of Big Data on Security
- ABSTRACT
- INTRODUCTION
- “BIG DATA” TERM
- BIG DATA AND TECHNOLOGY INNOVATION
- BIG DATA AND COMMERCIAL VALUE
- THE ‘DATA RUSH’
- BIG DATA MEANING
- OPPORTUNITIES OF BIG DATA RESEARCH
- CHALLENGES OF BIG DATA RESEARCH
- SAMPLING AND DATA COLLECTION
- BIG DATA MEASUREMENT
- DATA ANALYSIS AND INFERENCES
- INTERPRETATION AND THEORETICAL IMPLICATIONS
- THE BIG DATA IN CLOUD COMPUTING
- BIG DATA IMPACTS BUSINESS ENTERPRISES
- TYPES AND SOURCES OF BIG DATA
- THE ROLE OF BIG DATA IN SECURITY
- SECURITY AWARENESS IN BIG DATA ENVIROMNEMTS
- FUNDAMENTIALS TO IMPROVE SECURITY IN BIG DATA ENVIRONMENTS
- BIG DATA SECURITY AND PRIVACY CHALLENGES
- SECURITY ISSUES IN BIG DATA
- USING BIG DATA FOR BUSINESS RESEARCH
- BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT
- BIG DATA AND MOBILE PHONES
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 16: 16-Directional Geographical Traceback with Generalization to Three Dimensional Multidirectional Geographical IP Traceback
- ABSTRACT
- INTRODUCTION
- THE MERITS OF DGT SCHEMES
- THREE-DIMENSIONAL, MULTI-DIRECTIONAL GEOGRAPHICAL TRACEBACK
- DIRECTION RATIO SAMPLING ALGORITHM TRACEBACK BASICS
- RESULTS AND DISCUSSION
- COMPARISON OF DGT 16 WITH OTHER TRACEBACK SCHEMES
- SUMMARY
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 17: A New Approach in Cloud Computing User Authentication
- ABSTRACT
- INTRODUCTION
- SECURITY ISSUES IN CLOUD COMPUTING
- CHARACTERISTICS OF CLOUD COMPUTING
- CLOUD COMPUTING SERVICE MODEL (ARCHITECTURAL LAYERS OF CLOUD COMPUTING)
- CLOUD COMPUTING DEPLOYMENT MODEL
- THE PROPOSED SOLUTION
- CONCLUSION
- FUTURE DEVELOPMENTS
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 18: Trust Determination in Wireless Ad Hoc Networks
- ABSTRACT
- INTRODUCTION
- LITERATURE REVIEW
- THE NWTD ALGORITHM
- IMPLEMENTATION AND SIMULATION ENVIRONMENT
- RESULTS AND DISCUSSION
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 19: Security in Mobile Computing
- ABSTRACT
- INTRODUCTION
- MOBILE COMPUTING
- MOBILE OPERATING SYSTEMS
- ANDROID OPERATING SYSTEM
- iOS OPERATING SYSTEM
- SECURITY ISSUES IN MOBILE COMPUTING
- SECURITY IN ANDROID
- SECURITY IN iOS
- SOLUTIONS AND RECOMMENDATIONS
- FUTURE RESEARCH DIRECTIONS
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 20: The Security Impacts on Social Media Platforms
- ABSTRACT
- INTRODUCTION
- TYPES OF SOCIAL MEDIA PLATFORMS
- RISKS OF USING THE INTERNET
- THE IMPORTANCE OF SOCIAL MEDIA FOR ATTACKERS
- WHAT COULD GO WRONG IN SOCIAL MEDIA?
- EXAMPLES OF ATTACKING STYLES IN SOCIAL MEDIA
- WHY DO ATTACKERS SUCCEEDED IN THEIR ATTACKS?
- SOCIAL MEDIA LEGAL CHALLENGES
- THE SOCIAL MEDIA SECURITY ENVIRONMENT
- GENERAL SECURITY MODEL FOR SOCIAL MEDIA WEB SITES
- DATA THAT COULD BE MINED IN SOCIAL MEDIA
- POINTS OF ATTACKS IN SOCIAL MEDIA
- SECURITY DEFENSES AGAINST ATTACKS
- KINDS OF ATTACKS IN SOCIAL MEDIA
- REASONS OF ATTACKING SOCIAL MEDIA
- SOCIAL MEDIA PROGRAMMING FLAWS
- SOCIAL MEDIA SECURITY STRATEGY AND POLICY
- SOCIAL MEDIA PRIVACY AND GOVERNMENTS
- SOCIAL MEDIA SECURITY NEW TRENDS
- BEST PRACTICE
- CONCLUSION
- RECOMMENDATIONS
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Chapter 21: Security in Digital Images
- ABSTRACT
- INTRODUCTION
- CONCLUSION
- REFERENCES
- KEY TERMS AND DEFINITIONS
- Compilation of References
- About the Contributors