語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proactive and dynamic network defense
~
Lu, Zhuo.
Proactive and dynamic network defense
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Proactive and dynamic network defenseedited by Cliff Wang, Zhuo Lu.
其他作者:
Wang, Cliff.
出版者:
Cham :Springer International Publishing :2019.
面頁冊數:
xii, 264 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer security.
電子資源:
https://doi.org/10.1007/978-3-030-10597-6
ISBN:
9783030105976$q(electronic bk.)
Proactive and dynamic network defense
Proactive and dynamic network defense
[electronic resource] /edited by Cliff Wang, Zhuo Lu. - Cham :Springer International Publishing :2019. - xii, 264 p. :ill., digital ;24 cm. - Advances in information security,v.741568-2633 ;. - Advances in information security ;12..
1 Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity -- 2 Proactive Network Defense with Game Theory -- 3 Entropy-Based Proactive and Reactive Cyber-Physical Security -- 4 Security-Aware Incentives Design for Mobile Device-to-Device Offloading -- 5 Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas -- 6 Towards High-Resolution Multi-Stage Security Games -- 7 Moving Target Defense for Attack Mitigation in Multi-Vehicle Systems -- 8 The Role of Machine Learning and Radio Reconfigurability in the Quest for Wireless Security -- 9 Proactive User Authentication Using WiFi Signals in Dynamic Networks -- 10 Multi-Carrier Jamming Mitigation: A Proactive Game Theoretic Approach -- References.
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense. This book also presents the latest fundamental research results toward understanding proactive and dynamic network defense by top researchers in related areas. It includes research results that offer formal frameworks to define proactive and dynamic network defense, and develop novel models to analyze and evaluate proactive designs and strategies in computer systems, network systems, cyber-physical systems and wireless networks. A wide variety of scientific techniques have been highlighted to study these problems in the fundamental domain. As the convergence of our physical and digital worlds grows fast pace, protecting information systems from being tampered or unauthorized access is becoming one of the most importance issues. The traditional mechanisms of network defense are built upon a static, passive, and reactive nature, which has insufficient to defend against today's attackers that attempt to persistently analyze, probe, circumvent or fool such mechanisms. It has not yet been fully investigated to address the early stage of "cyber kill chain" when adversaries carry out sophisticated reconnaissance to plan attacks against a defense system. Recently, proactive and dynamic network defense has been proposed as an important alternative towards comprehensive network defense. Two representative types of such defense are moving target defense (MTD) and deception-based techniques. These emerging approaches show great promise to proactively disrupt the cyber-attack kill chain and are increasingly gaining interest within both academia and industry. However, these approaches are still in their preliminary design stage. Despite the promising potential, there are research issues yet to be solved regarding the effectiveness, efficiency, costs and usability of such approaches. In addition, it is also necessary to identify future research directions and challenges, which is an essential step towards fully embracing proactive and dynamic network defense. This book will serve as a great introduction for advanced-level computer science and engineering students who would like to start R&D efforts in the field of proactive and dynamic network defense. Researchers and professionals who work in this related field will also find this book useful as a reference.
ISBN: 9783030105976$q(electronic bk.)
Standard No.: 10.1007/978-3-030-10597-6doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25 / P763 2019
Dewey Class. No.: 005.8
Proactive and dynamic network defense
LDR
:04214nmm a2200337 a 4500
001
558685
003
DE-He213
005
20190522131536.0
006
m d
007
cr nn 008maaau
008
191219s2019 gw s 0 eng d
020
$a
9783030105976$q(electronic bk.)
020
$a
9783030105969$q(paper)
024
7
$a
10.1007/978-3-030-10597-6
$2
doi
035
$a
978-3-030-10597-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
P763 2019
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
P962 2019
245
0 0
$a
Proactive and dynamic network defense
$h
[electronic resource] /
$c
edited by Cliff Wang, Zhuo Lu.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xii, 264 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
1568-2633 ;
$v
v.74
505
0
$a
1 Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity -- 2 Proactive Network Defense with Game Theory -- 3 Entropy-Based Proactive and Reactive Cyber-Physical Security -- 4 Security-Aware Incentives Design for Mobile Device-to-Device Offloading -- 5 Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas -- 6 Towards High-Resolution Multi-Stage Security Games -- 7 Moving Target Defense for Attack Mitigation in Multi-Vehicle Systems -- 8 The Role of Machine Learning and Radio Reconfigurability in the Quest for Wireless Security -- 9 Proactive User Authentication Using WiFi Signals in Dynamic Networks -- 10 Multi-Carrier Jamming Mitigation: A Proactive Game Theoretic Approach -- References.
520
$a
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense. This book also presents the latest fundamental research results toward understanding proactive and dynamic network defense by top researchers in related areas. It includes research results that offer formal frameworks to define proactive and dynamic network defense, and develop novel models to analyze and evaluate proactive designs and strategies in computer systems, network systems, cyber-physical systems and wireless networks. A wide variety of scientific techniques have been highlighted to study these problems in the fundamental domain. As the convergence of our physical and digital worlds grows fast pace, protecting information systems from being tampered or unauthorized access is becoming one of the most importance issues. The traditional mechanisms of network defense are built upon a static, passive, and reactive nature, which has insufficient to defend against today's attackers that attempt to persistently analyze, probe, circumvent or fool such mechanisms. It has not yet been fully investigated to address the early stage of "cyber kill chain" when adversaries carry out sophisticated reconnaissance to plan attacks against a defense system. Recently, proactive and dynamic network defense has been proposed as an important alternative towards comprehensive network defense. Two representative types of such defense are moving target defense (MTD) and deception-based techniques. These emerging approaches show great promise to proactively disrupt the cyber-attack kill chain and are increasingly gaining interest within both academia and industry. However, these approaches are still in their preliminary design stage. Despite the promising potential, there are research issues yet to be solved regarding the effectiveness, efficiency, costs and usability of such approaches. In addition, it is also necessary to identify future research directions and challenges, which is an essential step towards fully embracing proactive and dynamic network defense. This book will serve as a great introduction for advanced-level computer science and engineering students who would like to start R&D efforts in the field of proactive and dynamic network defense. Researchers and professionals who work in this related field will also find this book useful as a reference.
650
0
$a
Computer security.
$3
184416
650
0
$a
Data protection.
$3
202312
650
0
$a
Telecommunication.
$3
182422
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Communications Engineering, Networks.
$3
273745
700
1
$a
Wang, Cliff.
$3
274484
700
1
$a
Lu, Zhuo.
$3
841408
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Advances in information security ;
$v
12.
$3
451557
856
4 0
$u
https://doi.org/10.1007/978-3-030-10597-6
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000171075
電子館藏
1圖書
電子書
EB QA76.9.A25 P962 2019 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-10597-6
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入