Handbook of Research on Threat Detection and Countermeasures in Network Security - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

21
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781466665835, 9781466665842

Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Muzhir Shaban Al-Ani

The terms biometrics and biometry have been used to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently biometrics refers to technologies and applications applied for personal identification using physical and behavioral parameters. Biometric security systems ensuring that only the authorized persons are permitted to access a certain data, because it is difficult to copy the biometric features pattern for a specific person. Biometrics is playing an important role in applications that are centric on identification, verification and classification. This chapter focuses on biometric security in their types, specifications, technologies and algorithms. Some algorithms of biometric security are also included in this chapter. Finally latest and future aspects of biometric system and merging technologies are also mentioned, including more details of system structures and specifications and what constitution will shape biometric security of in the future.


Author(s):  
Imad Fakhri Alshaikhli ◽  
Mohammad Abdulateef AlAhmad

Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a selected dedicated cryptographic hash function.


Author(s):  
Soukaena Hassan Hashem

This chapter aims to build a proposed Wire/Wireless Network Intrusion Detection System (WWNIDS) to detect intrusions and consider many of modern attacks which are not taken in account previously. The proposal WWNIDS treat intrusion detection with just intrinsic features but not all of them. The dataset of WWNIDS will consist of two parts; first part will be wire network dataset which has been constructed from KDD'99 that has 41 features with some modifications to produce the proposed dataset that called modern KDD and to be reliable in detecting intrusion by suggesting three additional features. The second part will be building wireless network dataset by collecting thousands of sessions (normal and intrusion); this proposed dataset is called Constructed Wireless Data Set (CWDS). The preprocessing process will be done on the two datasets (KDD & CWDS) to eliminate some problems that affect the detection of intrusion such as noise, missing values and duplication.


Author(s):  
Alaa Hussein Al-Hamami ◽  
Ghossoon M. Waleed Al-Saadoon

The techniques and tools available for the attackers and protectors are decisive and the main cause for deciding the leading and winning side. This chapter discusses the main concepts, developments, and future trends of security. There are three main reasons for security development and its innovation. The first reason is: Perfect security does not exist; this will lead the researcher to develop more and more methods to defend against new attacks and to support the existence security systems. The second reason is: New technology always brings new threats, which means new countermeasures against those threats is always a necessity. The third reason is: There is no single countermeasure that can be used to ensure security for our systems, and there are many new threats and attacks need to be defeated. For these reasons, security is very active subject and needs more financial support for research and system development, thoughts, technologies, tools, and skilled people to ensure and maintain security for our systems.


Author(s):  
Mohammed A. Otair

Due to the swift growth of the using of the digital multimedia in the internet these days, the security in digital images has become a very important issue. Lately, significant attentions are given by many researchers in the field of the security for digital images, and several image encryption techniques have been developed to improve the security levels of these images. Different techniques can be applied to protect intellectual property rights for digital images and prohibit illegal copying. The aim of this chapter is to introduce the most important techniques that have been developed to implement the security in digital images such as digital watermarking and image steganography.


Author(s):  
S. Karthik ◽  
A. Rajiv Kannan

Distributed denial-of-service attacks are a serious threat to the stability and availability of the Internet. Several traceback schemes are available to mitigate these attacks. Along with several IP traceback schemes, a latest one is the DGT in which the tracking is relying on geographical information. Segment direction ratios (SDR) a novel scheme to overcome the directional limitations of 23 DGT is proposed. This scheme is generalized to 2n DGT (n = 4).The concepts of DR, DRS and NDRS at a Router point is introduced based on uniqueness theorem. Three dimensional, multi-directional geographical traceback, using direction ratio algorithm (DRA) is proposed to remove the limitations. To overcome directions, dimensions and storage space deficiency, three dimensional multidirectional geographical IP traceback direction ratio sampling algorithm (DRSA) traceback is proposed.


Author(s):  
Wasim A. Al-Hamdani

Enterprise Resource Planning (ERP) software is business-management software that allows an organization to use a system of integrated applications to manage the business. ERP software often contains highly confidential information that is vital to a firm's competitiveness, so it is critically important that appropriate security be implemented to reduce its vulnerability. In this chapter, security issues are presented that could arise when ERP software is integrated with many systems and with web environments. The security issue is one of the major issues with ERP software, and it has not been a major focus of the developers of the software, who leave this issue to different components of the system and to vendor implementation. In this chapter, The author presents a new security model for ERP software. The author also presents a new authentication model that consists of the following layers: Role base, Data mining, Risk-based access control, and PKI.


Author(s):  
Zuhoor Abdullah Salim Al-Khanjari ◽  
Asaad Abdulrahman Nayyef

The increase of attacks on e-Government infrastructures led to the emergence of several information security techniques. Insider threat is one of the most complex problems in information security. It requires a sophisticated response to detect and protect the un-authorized use. This chapter provides a framework for developing a high level security management for e-Government website. The framework is based on the sensors and detectors, which consist of relatively small amounts of source code to detect all attacks in e-Government website against all threats in real time. In this chapter, the authors also provide a full illustration of how to design and protect all files used to implement a secure e-Government websites. This should contain a self- audit of the file and represent a kind of processes that are used to protect data in different types of files including: image, sound, string or any file within e-Government website.


Author(s):  
Mohammad Alaa Hussain Al-Hamami

Because of its importance, social media became a main target in cyber war and for criminals as well. The attacker can gain a lot of valued information from social media. This chapter will discuss the security impacts on social media and their effects on individuals, companies, and governments. This chapter, also will explain risks of using Internet, the importance of social media for attackers, what could go wrong in social media, examples of methods used by attackers, why attackers success in their attacks, social media problems from a legal point of view, social media security environment, general security model for social media web sites, data that could be mined, points of attack, security defenses against attacks, methods of security attacks, reasons of attacking social media, social media programming flaws, social media security strategy and policy, social media privacy and governments, social media security new trends, and the best practice in social media.


Sign in / Sign up

Export Citation Format

Share Document