Advancing Computational Intelligence Techniques for Security Systems Design

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture. This book covers both theoretical contributions and practical applications in security system design by applying the Internet of Things (IoT) and CI. It further explains the application of IoT in the design of modern security systems and how IoT blended with computational intel- ligence can make any security system improved and realizable.

Key features:

    • Focuses on the computational intelligence techniques of security system design

    • Covers applications and algorithms of discussed computational intelligence techniques

    • Includes convergence-based and enterprise integrated security systems with their applications

    • Explains emerging laws, policies, and tools affecting the landscape of cyber security

    • Discusses application of sensors toward the design of security systems

    This book will be useful for graduate students and researchers in electrical, computer

    engineering, security system design and engineering.

    Author(s): Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan
    Series: Computational Intelligence Techniques
    Publisher: CRC Press
    Year: 2022

    Language: English
    Pages: 182
    City: Boca Raton

    Cover
    Half Title
    Series Page
    Title Page
    Copyright Page
    Table of Contents
    Preface
    Editors
    Contributors
    Chapter 1 Analysis of Various Security Defense Frameworks in Different Application Areas of Cyber-Physical Systems
    1.1 Introduction
    1.2 History And Interpretation
    1.3 CPS Architecture
    1.3.1 Application Layer
    1.3.2 Transmission Layer
    1.3.3 Perception Layer
    1.4 Cyber-Physical System Characteristics
    1.5 Applications of CPS:
    1.6 Security
    1.7 Challenges and Issues Faced By CPS
    1.7.1 Implementation of the Task in CPS
    1.8 Risk Assessment
    1.8.1 Asset Identification
    1.8.2 Threat Identification
    1.8.3 Vulnerability Identification
    1.9 Cyber-Physical System Security
    1.9.1 CPS Security Requirements
    1.9.2 Cyber-Physical Systems Security Challenges
    1.10 Cyber-Physical Systems Security Solutions
    1.10.1 Solutions Based on Cryptography
    1.10.1.1 Security Goals of Cyber-Physical Systems
    1.10.2 Solutions Based on Non-Cryptography
    References
    Chapter 2 Role and Development of Security Architecture and Models in Software Systems
    2.1 Introduction
    2.2 Concepts in Secured System Architecture
    2.3 Security Models
    2.3.1 Categories of Security Models
    2.3.1.1 State Machine Models
    2.3.1.2 Information Flow Models
    2.3.1.3 Non-Interference Models
    2.3.2 Overview of Some Security Models
    2.3.2.1 Bell-LaPadula Model
    2.3.2.2 Biba Model
    2.3.2.3 Clark-Wilson Model
    2.3.2.4 Brewer and Nash Model (Chinese Wall Model)
    2.3.2.5 Graham-Denning Model
    2.3.2.6 Harrison-Ruzzo-Ullman Model
    2.3.3 Cloud Computing Security Models
    2.3.3.1 Cloud Multiple-Tenancy Model
    2.3.3.2 Cloud Risk Accumulation Model of CSA
    2.3.3.3 Jerico Forum’s Cloud Cube Model
    2.3.3.4 Mapping Model of Cloud, Security, and Compliance
    2.4 Security Challenges and Security Requirements in Internet of Things (IoT) Architecture
    2.5 Addressing Security Challenges in IoT with Artificial Intelligence (AI)
    2.6 Study of Research Works on Security Architecture and Models
    2.7 Conclusion
    2.8 Future Scope
    References
    Chapter 3 The Role of IoT in the Design of a Security System
    3.1 The Rise of Cyber Threats in IoT
    3.2 Enterprise View of IoT for Security Systems
    3.3 Future of IoT in Cyberspace
    3.4 Fundamentals of Security Systems
    3.5 Security Assessment of IoT Solutions
    References
    Chapter 4 IoT-Tangle Enhanced Security Systems
    4.1 Introduction
    4.2 Security Systems
    4.3 Artificial Intelligence
    4.3.1 Robotics
    4.3.2 Health Care
    4.3.3 Finance
    4.3.4 Travel and Transportation
    4.3.5 Social Media
    4.3.6 E-Commerce
    4.3.7 Marketing
    4.4 Internet of Things
    4.5 Blockchain
    4.5.1 Cryptography
    4.5.2 Public and Private Keys
    4.5.3 Hash Functions
    4.5.4 Consensus and Proof-of-Work
    4.5.5 Solidity & Smart Contracts
    4.5.6 Crypto Coins and DAPPS
    4.6 IoT and Blockchain
    4.6.1 Features of IoT
    4.7 The Solution
    4.8 Tangle
    4.8.1 What Do We Get Out of Tangle in Place of Blockchain?
    4.8.2 Tangle Transaction Issuance
    4.9 Conclusion
    References
    Chapter 5 Recent Trends in 5G and Machine Learning, Challenges, and Opportunities
    5.1 Introduction
    5.2 Machine Learning
    5.3 Neural Network
    5.4 Applications of Machine Learning and 5G
    5.5 Challenges in Machine Learning
    5.6 Conclusion
    References
    Chapter 6 Hardware Trojans in Microfluidic Biochips: Principles and Practice
    6.1 Introduction
    6.2 Hardware Trojan
    6.2.1 Overview
    6.2.2 Characterization
    6.2.3 Detection Mechanisms
    6.3 Microfluidic Biochips
    6.3.1 Background
    6.3.2 Flow-Based Microfluidic Biochip
    6.3.3 Droplet-Based Microfluidic Biochip
    6.4 Hardware Trojans In Microfluidic Biochips
    6.4.1 Overview
    6.4.2 Threat Scenario
    6.4.3 Trojan Activation
    6.4.4 Trojan Effects
    6.4.5 Trojan in DMFB
    6.4.6 Trojan in FMFB
    6.4.7 Defense Mechanisms
    6.5 Conclusion And Future Scope
    References
    Chapter 7 Benefits and Risks of Cloud Computing
    7.1 Cloud Computing
    7.2 Desired Features of Cloud Computing
    7.2.1 On-Demand Self-Service
    7.2.2 Broad Network Access
    7.2.3 Resource Pooling
    7.2.4 Measured Service
    7.2.5 Rapid Elasticity
    7.3 Service Models of Cloud Computing
    7.3.1 Software as a Service (SaaS)
    7.3.2 Platform-as-a-Service (PaaS)
    7.3.3 Infrastructure as a Service (IaaS)
    7.4 Deployment Models of Cloud Computing
    7.4.1 Public Cloud
    7.4.2 Private Cloud
    7.4.3 Hybrid Cloud
    7.4.4 Community Cloud
    7.5 Architecture of Cloud Computing
    7.6 Benefits of Cloud Computing
    7.6.1 Cost Reduction
    7.6.2 Uninterrupted Services
    7.6.3 Easy Implementation
    7.6.4 Scalability
    7.6.5 Green Computing
    7.7 Challenges in Cloud Computing
    7.8 Real-Time Example: Pitfalls in Amazon’s Cloud Security System
    7.9 Security Issues and Challenges in Cloud Computing
    7.9.1 Data Storage and Computing Security Issues
    7.9.1.1 Data Storage
    7.9.1.2 Data and Service Reliability and Availability
    7.9.1.3 Cryptography
    7.9.1.4 Cloud Data Recycling
    7.9.1.5 Data Backup and Recovery
    7.9.1.6 Security and Privacy
    7.9.2 Internet and Services Related Security Issues
    7.9.2.1 Advanced Repeated Threats and Venomous Outsiders
    7.9.2.2 Internet Protocols
    7.9.2.3 Web Services
    7.9.2.4 Web Technologies
    7.9.2.5 Service Availability
    7.9.3 Network Security Issues
    7.9.3.1 Mobile Networks
    7.9.3.2 Circumference Security
    7.9.3.3 XML Signature Element Wrapping
    7.9.3.4 Browser Security
    7.9.3.5 SQL (Structured Query Language) Injection Attack
    7.9.4 Access Control Issues
    7.9.4.1 Physical Access
    7.9.4.2 User Credentials
    7.9.4.3 Entity Authentication
    7.9.5 Software Security Issues
    7.9.5.1 Platforms and Frameworks
    7.9.5.2 User Front-End
    References
    Chapter 8 Intrusion Detection Systems for Trending Cyberattacks
    8.1 Introduction
    8.2 Classification of Intrusion Detection Systems
    8.2.1 Host Intrusion Detection Systems
    8.2.2 Network-Based Intrusion Detection Systems
    8.2.3 Protocol-Based Intrusion Detection Systems
    8.2.4 Application Protocol-Based Intrusion Detection Systems
    8.3 Hybrid Intrusion Detection Systems or Mixed Intrusion Detection Systems
    8.4 Firewalls
    8.4.1 Classification of Firewalls
    8.4.2 Introduction to the Cyberattacks
    8.4.2.1 Integrated
    8.4.2.2 Structured
    8.4.2.3 Massive
    8.4.2.4 Reinforced
    8.4.2.5 Not Spontaneous or Ad Hoc Attacks
    8.4.2.6 Time and Resources are Limited
    8.5 Trending Cyberattacks
    8.6 Future Scope and Conclusion
    References
    Chapter 9 War of Control Hijacking: Attacks and Defenses
    9.1 Introduction
    9.1.1 Control Flow
    9.1.2 Security Concerns
    9.2 Control Hijacking
    9.2.1 Buffer-Overflow Attacks
    9.2.2 Stack-Based Buffer Overflows
    9.2.3 Heap-Based Buffer Overflows
    9.2.4 Return to libc
    9.3 Return-Oriented Programming
    9.4 Heap Spray Attacks
    9.5 Integer Overflow Attacks
    9.6 Format String Vulnerabilities
    9.7 Defenses Against Control Hijacking
    9.7.1 Platform Defenses
    9.7.2 Fix Bugs
    9.7.3 Rewriting Software
    9.7.4 Non-Executable Memory (NEP)
    9.7.5 Address Space Layout Randomization (ASLR)
    9.7.6 Syscall Randomization
    9.7.7 Instruction Set Randomization (ISR)
    9.8 Runtime Defenses
    9.8.1 Stackguard
    9.8.2 Pointguard
    9.8.3 Libsafe
    9.8.4 Control-Flow Integrity
    9.8.5 Control Point Integrity
    9.9 Conclusion
    References
    Chapter 10 IoT Based Lightweight Cryptographic Schemes in Smart Healthcare
    10.1 Introduction
    10.2 What is IoT?
    10.2.1 Some of the Most Common IoT Workplace Applications
    10.2.2 What is IoT Security
    10.2.3 Managed Internet of Things Devices
    10.2.4 Security Issues With IoT
    10.2.5 Threats to IoT Security Are Present in Businesses.
    10.3 Lightweight Cryptography
    10.4 Symmetric Key Cryptography
    10.5 Public-Key Cryptography
    10.6 Lightweight Cryptography with High Security
    10.7 Lightweight Cryptography’s Power and Energy
    10.7.1 Power Consumption Issues at an Algorithmic Level
    10.7.2 Factors Related to Power Consumption at the Architecture Level
    10.8 Identifying the Benefits and Demerits of Lightweight Ciphers
    10.9 Conclusion
    References
    Index