2619:-
Uppskattad leveranstid 10-16 arbetsdagar
Fri frakt för medlemmar vid köp för minst 249:-
This handbook provides an overarching viewof cyber security and digital forensicchallenges related to big data and IoTenvironment, prior to reviewing existing datamining solutions and their potentialapplication in big data context, and existingauthentication and access control for IoTdevices. An IoT access control scheme and anIoT forensic framework is also presented inthis book, and it explains how theIoT forensic framework can be used to guideinvestigation of a popular cloud storageservice. A distributed file system forensicapproach is also presented, which is used toguide the investigation of Ceph. Minecraft, aMassively Multiplayer Online Game, and theHadoop distributed file system environment arealso forensically studied and their findingsreported in this book. A forensic IoT sourcecamera identification algorithm isintroduced, which uses the camera's sensorpattern noise from the captured image. In addition to the IoT access control andforensic frameworks, this handbook covers acyber defense triage process for nine advancedpersistent threat (APT) groups targeting IoTinfrastructure, namely: APT1, Molerats, SilentChollima, Shell Crew, NetTraveler,ProjectSauron, CopyKittens, Volatile Cedar andTransparent Tribe. The characteristics ofremote-controlled real-world Trojans using theCyber Kill Chain are also examined. It introduces a method to leverage differentcrashes discovered from two fuzzingapproaches, which can be used to enhance theeffectiveness of fuzzers. Cloud computing isalso often associated with IoT and big data(e.g., cloud-enabled IoT systems), and hence asurvey of the cloud security literature and asurvey of botnet detection approaches arepresented in the book. Finally, game securitysolutions are studied and explained howone may circumvent such solutions. This handbook targets the security, privacy and forensics research community,and big data research community, including policy makers and government agencies,public and private organizations policy makers. Undergraduate and postgraduatestudents enrolled in cyber security and forensic programs will also find this handbook useful as a reference.
- Format: Inbunden
- ISBN: 9783030105426
- Språk: Engelska
- Antal sidor: 384
- Utgivningsdatum: 2019-04-02
- Förlag: Springer Nature Switzerland AG