Wednesday, August 21, 2019

Advances in Security of Information and Communication Networks


File Size: 5.64 Mb

Description
This work introduces NETA, a novel framework for the simulation of communication networks attacks. It is built on top of the INET framework and the OMNET++ simulator, using the generally accepted implementations of many different protocols, as well as models for mobility, battery consumption, channel errors, etc. NETA is intended to become an useful framework for researchers focused on the network security field. Its flexible design is appropriate for the implementation and evaluation of many types of attacks, doing it accurate for the benchmarking of current defense solutions under same testing conditions or for the development of new defense techniques. As a proof of concept, three different attacks have been implemented in NETA. The capabilities of NETA are exhibited by evaluating the performance of the three implemented attacks under different MANET deployments.

Content:-
* Networking Security
1. NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study
2. Clustering Based Group Key Management for MANET
3. Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN
4. Hardware Advancements Effects on MANET Development, Application and Research
5. A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing
6. A Categorized Trust-Based Message Reporting Scheme for VANETs
* Data and Information Security
1. Blind Watermark Approach for Map Authentication Using Support Vector Machine
2. High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression
3. An HMM-Based Reputation Model
4. Towards IT-Legal Framework for Cloud Computing
5. A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps
* Authentication and Privacy
1. A Cattle Identification Approach Using Live Captured Muzzle Print Images
2. Algebraic Replay Attacks on Authentication in RFID Protocols
3. A Privacy Preserving Approach to Smart Metering
4. Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware
5. Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study
* Security Applications
1. Elderly Healthcare Data Protection Application for Ambient Assisted Living
2. A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics
3. Machine Learning Techniques for Anomalies Detection and Classification
4. Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing
5. Linear Correlation-Based Feature Selection for Network Intrusion Detection Model
Author Index

Author Details
"Ali Ismail Awad"

"Aboul Ella Hassanien"

"Kensuke Baba"




Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment