Fr. 170.00

Cybersecurity in Intelligent Networking Systems

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Informationen zum Autor Shengjie Xu, PhD, is an IEEE member and is an Assistant Professor in the Management Information Systems Department at San Diego State University, USA. Yi Qian, PhD, is an IEEE Fellow and is a Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln, USA. Rose Qingyang Hu, PhD, is an IEEE Fellow. She is also a Professor with the Electrical and Computer Engineering Department and the Associate Dean for Research of the College of Engineering, Utah State University, USA. Klappentext CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMSHelp protect your network system with this important reference work on cybersecurityCybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services--such as e-commerce, e-health, social networks, and other major cyber applications--it has become more critical to protect important information from being accessed. Data-driven network intelligence is a crucial development in protecting the security of modern network systems and ensuring information privacy.Cybersecurity in Intelligent Networking Systems provides a background introduction to data-driven cybersecurity, privacy preservation, and adversarial machine learning. It offers a comprehensive introduction to exploring technologies, applications, and issues in data-driven cyber infrastructure. It describes a proposed novel, data-driven network intelligence system that helps provide robust and trustworthy safeguards with edge-enabled cyber infrastructure, edge-enabled artificial intelligence (AI) engines, and threat intelligence. Focusing on encryption-based security protocol, this book also highlights the capability of a network intelligence system in helping target and identify unauthorized access, malicious interactions, and the destruction of critical information and communication technology.Cybersecurity in Intelligent Networking Systems readers will also find:* Fundamentals in AI for cybersecurity, including artificial intelligence, machine learning, and security threats* Latest technologies in data-driven privacy preservation, including differential privacy, federated learning, and homomorphic encryption* Key areas in adversarial machine learning, from both offense and defense perspectives* Descriptions of network anomalies and cyber threats* Background information on data-driven network intelligence for cybersecurity* Robust and secure edge intelligence for network anomaly detection against cyber intrusions* Detailed descriptions of the design of privacy-preserving security protocolsCybersecurity in Intelligent Networking Systems is an essential reference for all professional computer engineers and researchers in cybersecurity and artificial intelligence, as well as graduate students in these fields. Zusammenfassung CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMSHelp protect your network system with this important reference work on cybersecurityCybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services--such as e-commerce, e-health, social networks, and other major cyber applications--it has become more critical to protect important information from being accessed. Data-driven network intelligence is a crucial development in protecting the security of modern network systems and ensuring information privacy.Cybersecurity in Intelligent Networking Systems provides a background introduction to data-driven cybersecurity, privacy preservation, and adversarial machine learning. It offers a comprehensive introduction to exploring technologies, applications, and issues in data-driven cyber infrastructure. It describes a proposed novel, data-driven network intelligence system that helps provide robust and trustworthy safeguards ...

List of contents

Contents
 
Preface xiii
 
Acknowledgments xvii
 
Acronyms xix
 
1 Cybersecurity in the Era of Artificial Intelligence 1
 
1.1 Artificial Intelligence for Cybersecurity . 2
 
1.1.1 Artificial Intelligence 2
 
1.1.2 Machine Learning 4
 
1.1.3 Data-Driven Workflow for Cybersecurity . 6
 
1.2 Key Areas and Challenges 7
 
1.2.1 Anomaly Detection . 8
 
1.2.2 Trustworthy Artificial Intelligence . 10
 
1.2.3 Privacy Preservation . 10
 
1.3 Toolbox to Build Secure and Intelligent Systems . 11
 
1.3.1 Machine Learning and Deep Learning . 12
 
1.3.2 Privacy-Preserving Machine Learning . 14
 
1.3.3 Adversarial Machine Learning . 15
 
1.4 Data Repositories for Cybersecurity Research . 16
 
1.4.1 NSL-KDD . 17
 
1.4.2 UNSW-NB15 . 17
 
v
 
1.4.3 EMBER 18
 
1.5 Summary 18
 
2 Cyber Threats and Gateway Defense 19
 
2.1 Cyber Threats . 19
 
2.1.1 Cyber Intrusions . 20
 
2.1.2 Distributed Denial of Services Attack . 22
 
2.1.3 Malware and Shellcode . 23
 
2.2 Gateway Defense Approaches 23
 
2.2.1 Network Access Control 24
 
2.2.2 Anomaly Isolation 24
 
2.2.3 Collaborative Learning . 24
 
2.2.4 Secure Local Data Learning 25
 
2.3 Emerging Data-Driven Methods for Gateway Defense 26
 
2.3.1 Semi-Supervised Learning for Intrusion Detection 26
 
2.3.2 Transfer Learning for Intrusion Detection 27
 
2.3.3 Federated Learning for Privacy Preservation . 28
 
2.3.4 Reinforcement Learning for Penetration Test 29
 
2.4 Case Study: Reinforcement Learning for Automated Post-Breach
 
Penetration Test . 30
 
2.4.1 Literature Review 30
 
2.4.2 Research Idea 31
 
2.4.3 Training Agent using Deep Q-Learning 32
 
2.5 Summary 34
 
vi
 
3 Edge Computing and Secure Edge Intelligence 35
 
3.1 Edge Computing . 35
 
3.2 Key Advances in Edge Computing . 38
 
3.2.1 Security 38
 
3.2.2 Reliability . 41
 
3.2.3 Survivability . 42
 
3.3 Secure Edge Intelligence . 43
 
3.3.1 Background and Motivation 44
 
3.3.2 Design of Detection Module 45
 
3.3.3 Challenges against Poisoning Attacks . 48
 
3.4 Summary 49
 
4 Edge Intelligence for Intrusion Detection 51
 
4.1 Edge Cyberinfrastructure . 51
 
4.2 Edge AI Engine 53
 
4.2.1 Feature Engineering . 53
 
4.2.2 Model Learning . 54
 
4.2.3 Model Update 56
 
4.2.4 Predictive Analytics . 56
 
4.3 Threat Intelligence 57
 
4.4 Preliminary Study . 57
 
4.4.1 Dataset 57
 
4.4.2 Environment Setup . 59
 
4.4.3 Performance Evaluation . 59
 
vii
 
4.5 Summary 63
 
5 Robust Intrusion Detection 65
 
5.1 Preliminaries 65
 
5.1.1 Median Absolute Deviation . 65
 
5.1.2 Mahalanobis Distance 66
 
5.2 Robust Intrusion Detection . 67
 
5.2.1 Problem Formulation 67
 
5.2.2 Step 1: Robust Data Preprocessing 68
 
5.2.3 Step 2: Bagging for Labeled Anomalies 69
 
5.2.4 Step 3: One-Class SVM for Unlabeled Samples . 70
 
5.2.5 Step 4: Final Classifier . 74
 
5.3 Experiment and Evaluation . 76
 
5.3.1 Experiment Setup 76
 
5.3.2 Performance Evaluation . 81
 
5.4 Summary 92
 
6 Efficient Preprocessing Scheme for Anomaly Detection 93
 
6.1 Efficient Anomaly Detection . 93
 
6.1.1 Related Work . 95
 
6.1.2 Principal Component Ana

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.