Implementing enterprise cybersecurity with open-source software and standard architecture

This book describes multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. These projects are covered in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ab...

Full description

Saved in:
Bibliographic Details
Other Authors Handa, Anand (Editor), Negi, Rohit (Editor), Shukla, Sandeep K. (Editor)
Format Electronic eBook
LanguageEnglish
Published Gistrup, Denmark : River Publishers, [2021]
SeriesRiver Publishers series in security and digital forensics.
Subjects
Online AccessFull text
ISBN9788770224222
8770224226
9781003338512
1003338518
9781000794281
1000794288
9781000797442
1000797449
9788770224239
8770224234
Physical Description1 online resource (xxiv, 253 pages) : illustrations (some color)

Cover

Table of Contents:
  • Honeynet
  • Deploying a connected system of diverse honeypots using open-source tools / Sreeni Venugopal, Aditya Arun, Abhishek Ghildyal, Seshadri P.S., and Damandeep Singh
  • Implementation of honeypot, NIDS and HIDS technologies in SOC environment / Ronald Dalbhanjan, Sudipta Chatterjee, Rajdeep Gogoi, Tanuj Pathak, and Shivam Sahay
  • Leveraging research honeypots for generating credible threat intelligence and advanced threat analytics / Praveen Pathak, Mayank Raj Jaiswal, Mudit Kumar Gupta, Suraj Sharma, and Ranjit Singhnayak
  • Collating threat intelligence for Zero Trust Future using open-source tools / Piyush John, Siva Suryanarayana Nittala, and Suresh Chandanapalli
  • Malware analysis using machine learning / Charul Sharma, Kiran Desaraju, Krishna Tapasvi, Badrinarayan Ramamoorthy, and Krant Joshi
  • Feature engineering and analysis towards temporally robust detection of Android malware / Sagar Jaiswal, Anand Handa, Nitesh Kumar, and Sandeep K. Shukla
  • Use ModSecurity web application firewall to mitigate OWASP's Top 10 web application vulnerabilities / Lokesh Raju S., Santosh Sheshware, and Ruchit R. Patel
  • Offensive security with Huntsman: a concurrent versatile malware / Souvik Haldar.