Handbook of Big Data and Iot Security
暫譯: 大數據與物聯網安全手冊

Dehghantanha, Ali, Choo, Kim-Kwang Raymond

  • 出版商: Springer
  • 出版日期: 2019-04-02
  • 售價: $7,850
  • 貴賓價: 9.5$7,458
  • 語言: 英文
  • 頁數: 384
  • 裝訂: Hardcover - also called cloth, retail trade, or trade
  • ISBN: 3030105423
  • ISBN-13: 9783030105426
  • 相關分類: 大數據 Big-data物聯網 IoT資訊安全
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service.

A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image.

In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe.

The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions.

This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.


商品描述(中文翻譯)

本手冊提供了有關於大數據和物聯網環境中網絡安全及數位取證挑戰的整體概述,然後回顧現有的資料挖掘解決方案及其在大數據背景下的潛在應用,以及物聯網設備的現有身份驗證和存取控制。本書還介紹了一個物聯網存取控制方案和一個物聯網取證框架,並解釋了如何使用物聯網取證框架來指導對一個流行雲端儲存服務的調查。

本書還提出了一種分散式檔案系統取證方法,用於指導對 Ceph 的調查。《Minecraft》這款大型多人線上遊戲以及 Hadoop 分散式檔案系統環境也進行了取證研究,並在本書中報告了其發現。此外,還介紹了一種取證物聯網來源相機識別演算法,該演算法利用從捕獲圖像中提取的相機感測器模式噪聲。

除了物聯網存取控制和取證框架外,本手冊還涵蓋了針對物聯網基礎設施的九個高級持續威脅(APT)組的網絡防禦分流過程,這些組包括:APT1、Molerats、Silent Chollima、Shell Crew、NetTraveler、ProjectSauron、CopyKittens、Volatile Cedar 和 Transparent Tribe。

本書還檢視了使用網絡殺傷鏈的遠端控制實體木馬的特徵。它介紹了一種利用從兩種模糊測試方法中發現的不同崩潰的方式,這可以用來增強模糊測試工具的有效性。雲計算通常與物聯網和大數據相關(例如,雲端啟用的物聯網系統),因此本書中也呈現了雲安全文獻的調查和機器人網絡檢測方法的調查。最後,研究了遊戲安全解決方案,並解釋了如何繞過這些解決方案。

本手冊的目標讀者為安全、隱私和取證研究社群,以及大數據研究社群,包括政策制定者和政府機構、公私部門的政策制定者。就讀於網絡安全和取證課程的本科生和研究生也會發現本手冊作為參考資料非常有用。

作者簡介

Dr. Ali Dehghantanha is the Director of Cyber Science Lab in the School of Computer Science, University of Guelph (UofG), Ontario, Canada. He has served for more than a decade in a variety of industrial and academic positions with leading players in Cyber Security and Artificial Intelligence. Prior to joining UofG, he was a Senior Lecturer at the University of Sheffield, UK and an EU Marie-Curie International Incoming Fellow at the University of Salford, UK. He has a PhD in Security in Computing and a number of professional certifications including CISSP and CISM. His main research interests are malware analysis and digital forensics, IoT security and application of AI in the Cyber Security.

Kim-Kwang Raymond Choo received the Ph.D. in Information Security in 2006 from Queensland University of Technology, Australia. He currently holds the Cloud Technology Endowed Professorship at The University of Texas at San Antonio (UTSA). In 2016, he was named the Cybersecurity Educator of the Year - APAC (Cybersecurity Excellence Awards are produced in cooperation with the Information Security Community on LinkedIn), and in 2015 he and his team won the Digital Forensics Research Challenge organized by Germany's University of Erlangen-Nuremberg. He is the recipient of the 2018 UTSA College of Business Col. Jean Piccione and Lt. Col. Philip Piccione Endowed Research Award for Tenured Faculty, IEEE TrustCom 2018 Best Paper Award, ESORICS 2015 Best Research Paper Award, 2014 Highly Commended Award by the Australia New Zealand Policing Advisory Agency, Fulbright Scholarship in 2009, 2008 Australia Day Achievement Medallion, and British Computer Society's Wilkes Award in 2008. He is also a Fellow of the Australian Computer Society, an IEEE Senior Member, and the Co-Chair of IEEE Multimedia Communications Technical Committee (MMTC)'s Digital Rights Management for Multimedia Interest Group.

作者簡介(中文翻譯)

阿里·德哈甘塔哈博士是加拿大安大略省圭爾夫大學(University of Guelph, UofG)計算機科學學院的網絡科學實驗室主任。他在網絡安全和人工智能領域的多個工業和學術職位上工作了十多年,與領先的企業合作。在加入UofG之前,他曾擔任英國謝菲爾德大學的高級講師,以及英國索爾福德大學的歐盟瑪麗·居里國際來訪學者。他擁有計算安全的博士學位,並擁有多項專業認證,包括CISSP和CISM。他的主要研究興趣包括惡意軟件分析和數字取證、物聯網安全以及人工智能在網絡安全中的應用。

金光·雷蒙德·朱於2006年獲得澳大利亞昆士蘭科技大學的信息安全博士學位。他目前擔任德克薩斯州聖安東尼奧大學(The University of Texas at San Antonio, UTSA)的雲技術講座教授。2016年,他被評選為亞太地區的網絡安全教育者(Cybersecurity Educator of the Year - APAC,網絡安全卓越獎由LinkedIn上的信息安全社區合作頒發),並在2015年與他的團隊贏得了德國埃爾朗根-紐倫堡大學舉辦的數字取證研究挑戰賽。他是2018年UTSA商學院Col. Jean Piccione和Lt. Col. Philip Piccione終身研究獎的獲得者,IEEE TrustCom 2018最佳論文獎,ESORICS 2015最佳研究論文獎,2014年澳大利亞新西蘭警務諮詢機構的高度推薦獎,2009年富布賴特獎學金,2008年澳大利亞日成就獎勳章,以及2008年英國計算機學會的威爾克斯獎。他還是澳大利亞計算機學會的會士,IEEE高級會員,以及IEEE多媒體通信技術委員會(MMTC)數字版權管理興趣小組的共同主席。