Developing a cybersecurity immune system for industry 4.0
This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction...
Saved in:
| Main Author | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Gistrup, Denmark :
RIVER Publishers,
[2020]
|
| Series | River Publishers series in security and digital forensics.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9788770221870 8770221871 9781003337874 1003337872 9781000797213 100079721X 9781000794052 1000794059 877022188X 9788770221887 |
| Physical Description | 1 online resource |
Cover
| LEADER | 00000cam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | kn-on1164359108 | ||
| 003 | OCoLC | ||
| 005 | 20240717213016.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 200710s2020 dk ob 001 0 eng d | ||
| 040 | |a YDX |b eng |e rda |e pn |c YDX |d EBLCP |d N$T |d YDXIT |d OCLCF |d ESU |d OCLCQ |d OCLCO |d K6U |d OCLCQ |d YDX |d OCLCQ |d TYFRS |d SFB |d TYFRS |d UKAHL |d OCLCQ |d OCLCO |d OCLCL | ||
| 020 | |a 9788770221870 |q (electronic book) | ||
| 020 | |a 8770221871 |q (electronic book) | ||
| 020 | |a 9781003337874 |q (electronic bk.) | ||
| 020 | |a 1003337872 |q (electronic bk.) | ||
| 020 | |a 9781000797213 |q (electronic bk. : EPUB) | ||
| 020 | |a 100079721X |q (electronic bk. : EPUB) | ||
| 020 | |a 9781000794052 |q (electronic bk. : PDF) | ||
| 020 | |a 1000794059 |q (electronic bk. : PDF) | ||
| 020 | |z 877022188X | ||
| 020 | |z 9788770221887 | ||
| 024 | 7 | |a 10.1201/9781003337874 |2 doi | |
| 035 | |a (OCoLC)1164359108 |z (OCoLC)1163449555 |z (OCoLC)1163950767 | ||
| 100 | 1 | |a Petrenko, Sergei, |e author. | |
| 245 | 1 | 0 | |a Developing a cybersecurity immune system for industry 4.0 / |c Sergei Petrenko. |
| 264 | 1 | |a Gistrup, Denmark : |b RIVER Publishers, |c [2020] | |
| 300 | |a 1 online resource | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 490 | 1 | |a River Publishers Series in Security and Digital Forensics | |
| 504 | |a Includes bibliographical references and index. | ||
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks. | ||
| 505 | 0 | |a Foreword vii Preface xiii Acknowledgments xv -- List of Figures xvii -- List of Tables xxvii -- List of Abbreviations xxix Glossary xxxvii Introduction 1 -- 1 Cyber Immunity Concept of the Industry 4.0 -- 5 1.1 Cybersecurity Threat Landscape 6 -- 1.2 Geography of the Cyber-Attacks 19 -- 1.3 Biological Metaphor for Cyber Immunity of Industry 4.0 -- 23 -- 1.4 Prerequisites for the Creation of Cyber Immunity of Industry 4.0 -- 28 -- 1.5 An Even Older Immune Defense Organization 38 -- 1.6 Place of the Immune System of Protection 45 -- 1.7 Development of the Concept of Cyber Immunity of Industry 4.0 -- 50 -- 2 Mathematical Framework for Immune Protection of Industry 4.0 -- 67 -- 2.1 Known Mathematical Basis of Immune Protection 68 -- 2.2 Known Immune Response Models 77 -- 2.3 First Immune Response Software Systems 86 -- 2.4 Problem of the "Digital Bombs" Neutralization 96 -- 2.5 Program Faults Detection Method 108 -- 2.6 Introducing a Passport System for Programs 118 -- 2.7 "Digital Bombs" Neutralization Method 133 -- 2.8 Basic Definitions of Cyber Resilience 148 -- 2.9 Mathematical Formulation of the Cyber Resilience Control Problem 162 -- 3 Trends and Prospects of the Development of Immune Protection of Industry 4.0 -- 177 -- 3.1 Artificial Immune Networks 178 -- 3.2 Immunocomputing 190 -- 3.3 Hybrid Intelligent Protection System 200 -- 3.4 Detection of Anomalies Based on Dimensions 208 -- 3.5 Innovative Methods for Detecting Anomalies 220 -- 3.6 Data Processing Model on the Example of Oracle Solution 235 -- 3.7 Control of the Platform Semantic Correctness 250 -- 4 From the Detection of Cyber-Attacks to Self-Healing Industry 4.0 -- 265 -- 4.1 Classification of Methods for Detecting Cyber-Attacks and Anomalies 266 -- 4.2 Evaluation of the Known Methods for Detecting Cyber-Attacks and Anomalies 275 -- 4.3 Innovative Immune Response Method 287 -- 4.4 Immune Response Method Implementation 300 -- 4.5 Development of Immune Response Method 314 -- 4.6 Intellectual Cyber Resilience Orchestration 323. | |
| 505 | 8 | |a 4.7 The Semantic Correctness Control 338 -- 4.8 Organization of Self-Healing Computing 345 -- 4.9 New Scientific and Practical Results 366 Conclusion 377 -- References 379 -- Index 405 -- About the Author 409. | |
| 590 | |a Knovel |b Knovel (All titles) | ||
| 650 | 0 | |a Computer security. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 776 | 0 | 8 | |i Print version: |z 877022188X |z 9788770221887 |w (OCoLC)1149308515 |
| 830 | 0 | |a River Publishers series in security and digital forensics. | |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpDCISI003/developing-a-cybersecurity?kpromoter=marc |y Full text |