Information security practices : emerging threats and perspectives

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigm...

Full description

Saved in:
Bibliographic Details
Other Authors: Traoré, Issa, 1965- (Editor), Awad, Ahmed, (Editor), Woungang, Isaac, (Editor)
Format: eBook
Language: English
Published: Cham, Switzerland : Springer, [2017]
Subjects:
ISBN: 9783319489476
9783319489469
Physical Description: 1 online resource

Cover

Table of contents

LEADER 06118cam a2200493Ii 4500
001 99679
003 CZ-ZlUTB
005 20240914112127.0
006 m o d
007 cr cnu|||unuuu
008 170104s2017 sz ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d EBLCP  |d IDEBK  |d GW5XE  |d N$T  |d YDX  |d OCLCF  |d NJR  |d CNCGM  |d UPM  |d Z5A  |d OCLCQ  |d VT2  |d OCLCA  |d UAB  |d IOG  |d U3W  |d CAUOI  |d OCLCQ  |d KSU  |d RRP  |d AU@  |d OCLCQ  |d ESU  |d OCLCQ  |d LVT  |d WYU  |d TXI  |d OCLCQ  |d UKMGB  |d MERER  |d OCLCQ  |d ERF  |d UKBTH  |d LEATE  |d UKAHL  |d OCLCQ  |d LQU  |d OCLCQ 
020 |a 9783319489476  |q (electronic bk.) 
020 |z 9783319489469  |q (print) 
024 7 |a 10.1007/978-3-319-48947-6  |2 doi 
024 8 |a 10.1007/978-3-319-48 
035 |a (OCoLC)967656012  |z (OCoLC)967767528  |z (OCoLC)974651024  |z (OCoLC)981863539  |z (OCoLC)1005832610  |z (OCoLC)1011950408  |z (OCoLC)1048157317  |z (OCoLC)1058377813  |z (OCoLC)1066589529  |z (OCoLC)1066631939  |z (OCoLC)1086520063  |z (OCoLC)1112520540  |z (OCoLC)1113014801  |z (OCoLC)1113448406  |z (OCoLC)1116170609  |z (OCoLC)1122818386  |z (OCoLC)1127113733  |z (OCoLC)1136562545  |z (OCoLC)1156182109 
245 0 0 |a Information security practices :  |b emerging threats and perspectives /  |c Issa Traoré, Ahmed Awad, Isaac Woungang, editors. 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2017] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
505 0 |a Preface; Contents; Chapter 1: Introduction: Emerging Threats Call for New Security Paradigms; 1.1 Emerging Threats Landscape; 1.2 Next Generation Cybersecurity Systems; References; Chapter 2: Botnets Threat Analysis and Detection; 2.1 Introduction; 2.2 Evolution of Botnets: History and Topologies; 2.3 Famous Botnets; 2.3.1 ZeuS or Zbot; 2.3.2 Koobface; 2.3.3 Windigo; 2.4 Botnet Detection Evasion Techniques; 2.5 Botnet Detection Methodologies; 2.5.1 Passive Techniques; 2.5.1.1 Packet Inspection; 2.5.1.2 Analysis of Flow Records; 2.5.1.3 DNS-Based Approaches; 2.5.1.4 Analysis of Spam Records. 
505 8 |a 2.5.1.5 Analysis of (Application) Log Files2.5.1.6 Honeypots; 2.5.1.7 Evaluation of Antivirus; 2.5.1.8 Software Feedback; 2.5.2 Active Techniques; 2.5.2.1 Sinkholing; 2.5.2.2 DNS Cache Snooping; 2.5.2.3 Infiltration; 2.5.2.4 Tracking of Fast-Flux Network; 2.6 Defense Against Botnet Using Network Security Devices; 2.6.1 Intrusion Prevention and Detection Systems; 2.6.2 Network Firewalls; 2.6.2.1 Dynamic and Administrator Blacklist Data; 2.6.2.2 Traffic Classification and Reporting; 2.6.2.3 Domain Name System Snooping; 2.7 Security Measures Against Botnets; 2.7.1 Network Design. 
505 8 |a 2.7.1.1 Advance Threat Protection2.7.1.2 Intrusion Prevention and Detection System; 2.7.1.3 Email Security Systems; 2.7.1.4 Forensic Analysis; 2.7.1.5 Security Event Monitoring; 2.7.2 Application Usage; 2.7.2.1 HIPS (Host-Based Intrusion Prevention System); 2.7.2.2 End Point Security; 2.7.2.3 Application Firewall; 2.8 Conclusion; References; Chapter 3: Collective Framework for Fraud Detection Using Behavioral Biometrics; 3.1 Background; 3.2 Fraud Detection Framework; 3.3 Behavioral Identity Verification; 3.4 Experimental Evaluation; 3.4.1 Evaluation Metrics and Procedures; 3.4.2 Results. 
505 8 |a 3.5 ConclusionReferences; Chapter 4: The Hardware Trojan System: An Online Suite of Tools for Hardware Trojan Analysis; 4.1 Introduction; 4.2 Hardware Trojan Analysis Techniques; 4.2.1 Trojan Classification; 4.2.2 Trojan Evaluation; 4.3 The Hardware Trojan System; 4.3.1 The Classification Tool; 4.3.2 The Evaluation Tool; 4.3.3 The Web Environment; 4.4 Case Study; 4.4.1 Classification Tool; 4.4.2 Evaluation Tool; 4.5 Conclusion; References; Chapter 5: Combining Mouse and Eye Movement Biometrics for User Authentication; 5.1 Introduction; 5.2 Related Work. 
505 8 |a 5.2.1 Previous Research on Mouse Movements5.2.2 Previous Research on Eye Movements; 5.3 Experiment Setting and Design; 5.3.1 Experiment Setting; 5.3.2 Participants; 5.3.3 Experiment Design; 5.3.4 Experiment Procedure; 5.4 Data Processing and Feature Extraction; 5.4.1 Data Alignment; 5.4.2 Data Cleaning; 5.4.3 Data Visualization; 5.4.4 Feature Extraction; 5.5 Proposed Approaches; 5.5.1 Simple Multi-class Classification Model; 5.5.2 Binary Classification Model; 5.5.3 Regression Model Using Fusion; 5.6 Result and Discussion; 5.7 Conclusion and Future Research Direction; References. 
504 |a Includes bibliographical references and index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. 
590 |a SpringerLink  |b Springer Complete eBooks 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Traoré, Issa,  |d 1965-  |e editor. 
700 1 |a Awad, Ahmed,  |e editor. 
700 1 |a Woungang, Isaac,  |e editor. 
776 0 8 |i Print version:  |t Information security practices.  |d Cham, Switzerland : Springer, [2017]  |z 3319489461  |z 9783319489469  |w (OCoLC)959950255 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://link.springer.com/10.1007/978-3-319-48947-6  |y Plný text 
992 |c NTK-SpringerENG 
999 |c 99679  |d 99679 
993 |x NEPOSILAT  |y EIZ