語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proactive and dynamic network defense
~
Wang, Cliff.
FindBook
Google Book
Amazon
博客來
Proactive and dynamic network defense
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Proactive and dynamic network defense/ edited by Cliff Wang, Zhuo Lu.
其他作者:
Wang, Cliff.
出版者:
Cham :Springer International Publishing : : 2019.,
面頁冊數:
xii, 264 p. :ill., digital ;24 cm.
內容註:
1 Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity -- 2 Proactive Network Defense with Game Theory -- 3 Entropy-Based Proactive and Reactive Cyber-Physical Security -- 4 Security-Aware Incentives Design for Mobile Device-to-Device Offloading -- 5 Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas -- 6 Towards High-Resolution Multi-Stage Security Games -- 7 Moving Target Defense for Attack Mitigation in Multi-Vehicle Systems -- 8 The Role of Machine Learning and Radio Reconfigurability in the Quest for Wireless Security -- 9 Proactive User Authentication Using WiFi Signals in Dynamic Networks -- 10 Multi-Carrier Jamming Mitigation: A Proactive Game Theoretic Approach -- References.
Contained By:
Springer eBooks
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-030-10597-6
ISBN:
9783030105976
Proactive and dynamic network defense
Proactive and dynamic network defense
[electronic resource] /edited by Cliff Wang, Zhuo Lu. - Cham :Springer International Publishing :2019. - xii, 264 p. :ill., digital ;24 cm. - Advances in information security,v.741568-2633 ;. - Advances in information security ;v.74..
1 Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity -- 2 Proactive Network Defense with Game Theory -- 3 Entropy-Based Proactive and Reactive Cyber-Physical Security -- 4 Security-Aware Incentives Design for Mobile Device-to-Device Offloading -- 5 Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas -- 6 Towards High-Resolution Multi-Stage Security Games -- 7 Moving Target Defense for Attack Mitigation in Multi-Vehicle Systems -- 8 The Role of Machine Learning and Radio Reconfigurability in the Quest for Wireless Security -- 9 Proactive User Authentication Using WiFi Signals in Dynamic Networks -- 10 Multi-Carrier Jamming Mitigation: A Proactive Game Theoretic Approach -- References.
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense. This book also presents the latest fundamental research results toward understanding proactive and dynamic network defense by top researchers in related areas. It includes research results that offer formal frameworks to define proactive and dynamic network defense, and develop novel models to analyze and evaluate proactive designs and strategies in computer systems, network systems, cyber-physical systems and wireless networks. A wide variety of scientific techniques have been highlighted to study these problems in the fundamental domain. As the convergence of our physical and digital worlds grows fast pace, protecting information systems from being tampered or unauthorized access is becoming one of the most importance issues. The traditional mechanisms of network defense are built upon a static, passive, and reactive nature, which has insufficient to defend against today's attackers that attempt to persistently analyze, probe, circumvent or fool such mechanisms. It has not yet been fully investigated to address the early stage of "cyber kill chain" when adversaries carry out sophisticated reconnaissance to plan attacks against a defense system. Recently, proactive and dynamic network defense has been proposed as an important alternative towards comprehensive network defense. Two representative types of such defense are moving target defense (MTD) and deception-based techniques. These emerging approaches show great promise to proactively disrupt the cyber-attack kill chain and are increasingly gaining interest within both academia and industry. However, these approaches are still in their preliminary design stage. Despite the promising potential, there are research issues yet to be solved regarding the effectiveness, efficiency, costs and usability of such approaches. In addition, it is also necessary to identify future research directions and challenges, which is an essential step towards fully embracing proactive and dynamic network defense. This book will serve as a great introduction for advanced-level computer science and engineering students who would like to start R&D efforts in the field of proactive and dynamic network defense. Researchers and professionals who work in this related field will also find this book useful as a reference.
ISBN: 9783030105976
Standard No.: 10.1007/978-3-030-10597-6doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / P763 2019
Dewey Class. No.: 005.8
Proactive and dynamic network defense
LDR
:04214nmm a2200337 a 4500
001
2191196
003
DE-He213
005
20190522131536.0
006
m d
007
cr nn 008maaau
008
200504s2019 gw s 0 eng d
020
$a
9783030105976
$q
(electronic bk.)
020
$a
9783030105969
$q
(paper)
024
7
$a
10.1007/978-3-030-10597-6
$2
doi
035
$a
978-3-030-10597-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
P763 2019
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
P962 2019
245
0 0
$a
Proactive and dynamic network defense
$h
[electronic resource] /
$c
edited by Cliff Wang, Zhuo Lu.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xii, 264 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
1568-2633 ;
$v
v.74
505
0
$a
1 Cybersecurity Dynamics: A Foundation for the Science of Cybersecurity -- 2 Proactive Network Defense with Game Theory -- 3 Entropy-Based Proactive and Reactive Cyber-Physical Security -- 4 Security-Aware Incentives Design for Mobile Device-to-Device Offloading -- 5 Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas -- 6 Towards High-Resolution Multi-Stage Security Games -- 7 Moving Target Defense for Attack Mitigation in Multi-Vehicle Systems -- 8 The Role of Machine Learning and Radio Reconfigurability in the Quest for Wireless Security -- 9 Proactive User Authentication Using WiFi Signals in Dynamic Networks -- 10 Multi-Carrier Jamming Mitigation: A Proactive Game Theoretic Approach -- References.
520
$a
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense. This book also presents the latest fundamental research results toward understanding proactive and dynamic network defense by top researchers in related areas. It includes research results that offer formal frameworks to define proactive and dynamic network defense, and develop novel models to analyze and evaluate proactive designs and strategies in computer systems, network systems, cyber-physical systems and wireless networks. A wide variety of scientific techniques have been highlighted to study these problems in the fundamental domain. As the convergence of our physical and digital worlds grows fast pace, protecting information systems from being tampered or unauthorized access is becoming one of the most importance issues. The traditional mechanisms of network defense are built upon a static, passive, and reactive nature, which has insufficient to defend against today's attackers that attempt to persistently analyze, probe, circumvent or fool such mechanisms. It has not yet been fully investigated to address the early stage of "cyber kill chain" when adversaries carry out sophisticated reconnaissance to plan attacks against a defense system. Recently, proactive and dynamic network defense has been proposed as an important alternative towards comprehensive network defense. Two representative types of such defense are moving target defense (MTD) and deception-based techniques. These emerging approaches show great promise to proactively disrupt the cyber-attack kill chain and are increasingly gaining interest within both academia and industry. However, these approaches are still in their preliminary design stage. Despite the promising potential, there are research issues yet to be solved regarding the effectiveness, efficiency, costs and usability of such approaches. In addition, it is also necessary to identify future research directions and challenges, which is an essential step towards fully embracing proactive and dynamic network defense. This book will serve as a great introduction for advanced-level computer science and engineering students who would like to start R&D efforts in the field of proactive and dynamic network defense. Researchers and professionals who work in this related field will also find this book useful as a reference.
650
0
$a
Computer security.
$3
540555
650
0
$a
Data protection.
$3
590548
650
0
$a
Telecommunication.
$3
530527
650
1 4
$a
Security.
$3
3134865
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Communications Engineering, Networks.
$3
891094
700
1
$a
Wang, Cliff.
$3
898853
700
1
$a
Lu, Zhuo.
$3
2094207
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Advances in information security ;
$v
v.74.
$3
3410326
856
4 0
$u
https://doi.org/10.1007/978-3-030-10597-6
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9373840
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 P763 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入