|
|
|
|
LEADER |
05231nam a2200505 4500 |
001 |
978-3-030-10597-6 |
003 |
DE-He213 |
005 |
20191220125600.0 |
007 |
cr nn 008mamaa |
008 |
190522s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030105976
|9 978-3-030-10597-6
|
024 |
7 |
|
|a 10.1007/978-3-030-10597-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Proactive and Dynamic Network Defense
|h [electronic resource] /
|c edited by Cliff Wang, Zhuo Lu.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XII, 264 p. 87 illus., 65 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 74
|
505 |
0 |
|
|a 1 Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity -- 2 Proactive Network Defense with Game Theory -- 3 Entropy-Based Proactive and Reactive Cyber-Physical Security -- 4 Security-Aware Incentives Design for Mobile Device-to-Device Offloading -- 5 Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas -- 6 Towards High-Resolution Multi-Stage Security Games -- 7 Moving Target Defense for Attack Mitigation in Multi-Vehicle Systems -- 8 The Role of Machine Learning and Radio Reconfigurability in the Quest for Wireless Security -- 9 Proactive User Authentication Using WiFi Signals in Dynamic Networks -- 10 Multi-Carrier Jamming Mitigation: A Proactive Game Theoretic Approach -- References.
|
520 |
|
|
|a This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense. This book also presents the latest fundamental research results toward understanding proactive and dynamic network defense by top researchers in related areas. It includes research results that offer formal frameworks to define proactive and dynamic network defense, and develop novel models to analyze and evaluate proactive designs and strategies in computer systems, network systems, cyber-physical systems and wireless networks. A wide variety of scientific techniques have been highlighted to study these problems in the fundamental domain. As the convergence of our physical and digital worlds grows fast pace, protecting information systems from being tampered or unauthorized access is becoming one of the most importance issues. The traditional mechanisms of network defense are built upon a static, passive, and reactive nature, which has insufficient to defend against today's attackers that attempt to persistently analyze, probe, circumvent or fool such mechanisms. It has not yet been fully investigated to address the early stage of "cyber kill chain" when adversaries carry out sophisticated reconnaissance to plan attacks against a defense system. Recently, proactive and dynamic network defense has been proposed as an important alternative towards comprehensive network defense. Two representative types of such defense are moving target defense (MTD) and deception-based techniques. These emerging approaches show great promise to proactively disrupt the cyber-attack kill chain and are increasingly gaining interest within both academia and industry. However, these approaches are still in their preliminary design stage. Despite the promising potential, there are research issues yet to be solved regarding the effectiveness, efficiency, costs and usability of such approaches. In addition, it is also necessary to identify future research directions and challenges, which is an essential step towards fully embracing proactive and dynamic network defense. This book will serve as a great introduction for advanced-level computer science and engineering students who would like to start R&D efforts in the field of proactive and dynamic network defense. Researchers and professionals who work in this related field will also find this book useful as a reference.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/T24035
|
700 |
1 |
|
|a Wang, Cliff.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Lu, Zhuo.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030105969
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030105983
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 74
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-10597-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|