صورة الغلاف المحلية
صورة الغلاف المحلية
عرض عادي

Cyberdefense : The Next Generation / Marcus Matthias Keupp.

بواسطة:نوع المادة : نصنصالسلاسل:International Series in Operations Research and Management Science Seriesالناشر:Cham : Springer International Publishing AG, 2023تاريخ حقوق النشر: ©2023الطبعات:1st edوصف:1 online resource (236 pages)نوع المحتوى:
  • text
نوع الوسائط:
  • computer
نوع الناقل:
  • online resource
تدمك:
  • 9783031301919
الموضوع:النوع/الشكل:تصنيف مكتبة الكونجرس:
  • QA76.9.A25  .C934 2023
المحتويات:
Intro -- Preface -- Contents -- Editor and Contributors -- 1 Introduction and Overview -- 1.1 Next Generation Cyberdefense -- 1.2 Structure and Overview -- 1.2.1 Speed -- 1.2.2 Foresight -- 1.2.3 Effectiveness -- 1.3 Outlook: From Defense to Counter-Attack -- References -- Part I Speed -- 2 Reducing Time to Response in Cyber Defense: An Agent-based Model -- 2.1 Introduction -- 2.2 Agent-based Model -- 2.2.1 Structure -- 2.2.2 Dynamics of Agents A -- 2.2.3 Dynamics of Agents B -- 2.2.4 Worked Example -- 2.3 Illustration -- 2.4 Conclusion -- References -- 3 Unsupervised Attack Isolation in Cyber-physical Systems: A Competitive Test of Clustering Algorithms -- 3.1 The Attack Isolation Problem -- 3.2 Experimental Infrastructure, Data, and Analysis -- 3.3 Results -- 3.3.1 Comparative Accuracy -- 3.3.2 Pairwise Comparison of k-Means and k-Shape -- 3.3.3 Pairwise Comparison of k-Shape and TTC -- 3.4 Conclusion -- References -- 4 Next Generation ISACs: Simulating Crowdsourced Intelligence for Faster Incident Response -- 4.1 Limitations to Security Information Sharing -- 4.2 Crowdsourced Intelligence Sharing Platforms -- 4.2.1 ThreatFox -- 4.2.2 MISP -- 4.3 Hierarchical Simulation Model -- 4.3.1 User Arrival Subprocess -- 4.3.2 IoC Arrival Subprocess -- 4.3.3 Behavioral Subprocess -- 4.3.4 Sampling Procedure -- 4.4 Simulation Results -- 4.5 Conclusion -- References -- Part II Foresight -- 5 Identification of Future Cyberdefense Technology by Text Mining -- 5.1 Introduction -- 5.2 Bibliometric Method -- 5.3 Maturity -- 5.4 Security Issues -- 5.5 Expert Opinion -- 5.6 Conclusion -- References -- 6 A Novel Algorithm for Informed Investment in Cybersecurity Companies and Technologies -- 6.1 Problem -- 6.2 Algorithm -- 6.3 Evaluation -- 6.4 Discussion -- References.
7 Identifying Emerging Technologies and Influential Companies Using Network Dynamics of Patent Clusters -- 7.1 The Challenge of Predicting Emerging Technology -- 7.2 Structure of the Recommender System -- 7.2.1 Data Science Layer -- 7.2.2 Machine Learning Layer -- 7.2.3 Managerial Layer -- 7.2.4 Network Science Layer -- 7.3 Illustration -- 7.4 Discussion -- References -- 8 Cybersecurity Ecosystems: A Network Study from Switzerland -- 8.1 Capability Dispersion -- 8.2 Analysis -- 8.2.1 Sector-Specific Analysis -- 8.2.2 Network Analysis -- 8.3 Conclusion -- References -- 9 Anticipating Cyberdefense Capability Requirements by Link Prediction Analysis -- 9.1 Predicting Technology Requirements From Job Openings -- 9.2 Link Prediction Model -- 9.3 Results -- 9.4 Discussion -- References -- Part III Effectiveness -- 10 Drawing with Limited Resources: Statistical Modeling of Computer Network Exploitation and Prevention -- 10.1 Introduction -- 10.2 Theoretical Model -- 10.2.1 Drawing and Evaluation of Information Units -- 10.2.2 Interaction with Defenders -- 10.3 Illustrations -- 10.4 Conclusion -- References -- 11 Individual Career Versus Corporate Security: A Simulation of CSO Investment Choices -- 11.1 Introduction -- 11.2 Modeling CSO Investment Decisions -- 11.2.1 Basic Gordon-Loeb Setup -- 11.2.2 Dynamic Extension -- 11.2.3 CSO Reputation and Self-interest -- 11.2.4 Recursive Modeling of CSO Reputation -- 11.3 Simulation Set-Up and Parameter Initialization -- 11.4 Results -- 11.5 Conclusion -- References -- 12 Improving Human Responses to Cyberdefense by Serious Gaming -- 12.1 Social Engineering and Information Security -- 12.2 Experiment -- 12.2.1 Pre-test Phase -- 12.2.2 Treatment -- 12.2.3 Post-test Phase -- 12.3 Effect Size and Marginal Analysis -- 12.4 Conclusion -- References -- 13 Next Generation Cyber-Physical Architecture and Training.
13.1 Mixed Reality Architecture -- 13.2 Zero Trust Architectures -- 13.3 Automated Defense -- References -- 14 Improving the Effectiveness of Cyberdefense Measures -- 14.1 Introduction -- 14.2 Model -- 14.2.1 Sequence Matching Procedure -- 14.2.2 Clustering Method -- 14.2.3 Network Analysis -- 14.3 Worked Example -- 14.4 Conclusion -- References -- Correction to: International Law and Cyber Defense Best Practices: The Way Forward -- Correction to: Chapter 15 in: M. M. Keupp (ed.), Cyberdefense, International Series in Operations Research &amp -- Management Science 342, https://doi.org/10.1007/978-3-031-30191-9_15 -- Correction to: International Law and Cyber Defense Best Practices: The Way Forward -- Correction to: Chapter 15 in: M. M. Keupp (ed.), Cyberdefense, International Series in Operations Research &amp -- Management Science 342, https://doi.org/10.1007/978-3-031-30191-9_15 -- 15 International Law and Cyber Defense Best Practices: The Way Forward -- 15.1 International Law and the Cyberspace -- 15.2 The Transformation Challenge -- 15.3 The Implementation Agenda -- 15.4 Conclusion -- References.
ملخص:This book analyzes cyberdefense from a novel and interdisciplinary perspective, offering solutions for problems that have long impeded a more efficient defense. It explains why cyberdefense organized and performed by humans is too slow, too cumbersome, and too ineffective. Combining the analytical capabilities of experts in operations research and management, international security studies, economics, risk analysis, and defense management, the volume addresses these problems of current cyberdefense. The authors present suggestions for the next generation of cyberdefense, explaining why the future defense must focus on speeding up responses, why a single response may not be enough, and why effectiveness requires foresight.This makes the book a must-read for scholars, researchers, intelligence analysts, homeland security staff, and professionals who are interested in learning more about the issues of current cyberdefense, as well as solutions for the next generation of cyberdefense.
قوائم هذه المادة تظهر في: Electronic Books | الكتب الإلكترونية
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رابط URL حالة تاريخ الإستحقاق الباركود
مصدر رقمي مصدر رقمي UAE Federation Library | مكتبة اتحاد الإمارات Online Copy | نسخة إلكترونية رابط إلى المورد لا يعار

Intro -- Preface -- Contents -- Editor and Contributors -- 1 Introduction and Overview -- 1.1 Next Generation Cyberdefense -- 1.2 Structure and Overview -- 1.2.1 Speed -- 1.2.2 Foresight -- 1.2.3 Effectiveness -- 1.3 Outlook: From Defense to Counter-Attack -- References -- Part I Speed -- 2 Reducing Time to Response in Cyber Defense: An Agent-based Model -- 2.1 Introduction -- 2.2 Agent-based Model -- 2.2.1 Structure -- 2.2.2 Dynamics of Agents A -- 2.2.3 Dynamics of Agents B -- 2.2.4 Worked Example -- 2.3 Illustration -- 2.4 Conclusion -- References -- 3 Unsupervised Attack Isolation in Cyber-physical Systems: A Competitive Test of Clustering Algorithms -- 3.1 The Attack Isolation Problem -- 3.2 Experimental Infrastructure, Data, and Analysis -- 3.3 Results -- 3.3.1 Comparative Accuracy -- 3.3.2 Pairwise Comparison of k-Means and k-Shape -- 3.3.3 Pairwise Comparison of k-Shape and TTC -- 3.4 Conclusion -- References -- 4 Next Generation ISACs: Simulating Crowdsourced Intelligence for Faster Incident Response -- 4.1 Limitations to Security Information Sharing -- 4.2 Crowdsourced Intelligence Sharing Platforms -- 4.2.1 ThreatFox -- 4.2.2 MISP -- 4.3 Hierarchical Simulation Model -- 4.3.1 User Arrival Subprocess -- 4.3.2 IoC Arrival Subprocess -- 4.3.3 Behavioral Subprocess -- 4.3.4 Sampling Procedure -- 4.4 Simulation Results -- 4.5 Conclusion -- References -- Part II Foresight -- 5 Identification of Future Cyberdefense Technology by Text Mining -- 5.1 Introduction -- 5.2 Bibliometric Method -- 5.3 Maturity -- 5.4 Security Issues -- 5.5 Expert Opinion -- 5.6 Conclusion -- References -- 6 A Novel Algorithm for Informed Investment in Cybersecurity Companies and Technologies -- 6.1 Problem -- 6.2 Algorithm -- 6.3 Evaluation -- 6.4 Discussion -- References.

7 Identifying Emerging Technologies and Influential Companies Using Network Dynamics of Patent Clusters -- 7.1 The Challenge of Predicting Emerging Technology -- 7.2 Structure of the Recommender System -- 7.2.1 Data Science Layer -- 7.2.2 Machine Learning Layer -- 7.2.3 Managerial Layer -- 7.2.4 Network Science Layer -- 7.3 Illustration -- 7.4 Discussion -- References -- 8 Cybersecurity Ecosystems: A Network Study from Switzerland -- 8.1 Capability Dispersion -- 8.2 Analysis -- 8.2.1 Sector-Specific Analysis -- 8.2.2 Network Analysis -- 8.3 Conclusion -- References -- 9 Anticipating Cyberdefense Capability Requirements by Link Prediction Analysis -- 9.1 Predicting Technology Requirements From Job Openings -- 9.2 Link Prediction Model -- 9.3 Results -- 9.4 Discussion -- References -- Part III Effectiveness -- 10 Drawing with Limited Resources: Statistical Modeling of Computer Network Exploitation and Prevention -- 10.1 Introduction -- 10.2 Theoretical Model -- 10.2.1 Drawing and Evaluation of Information Units -- 10.2.2 Interaction with Defenders -- 10.3 Illustrations -- 10.4 Conclusion -- References -- 11 Individual Career Versus Corporate Security: A Simulation of CSO Investment Choices -- 11.1 Introduction -- 11.2 Modeling CSO Investment Decisions -- 11.2.1 Basic Gordon-Loeb Setup -- 11.2.2 Dynamic Extension -- 11.2.3 CSO Reputation and Self-interest -- 11.2.4 Recursive Modeling of CSO Reputation -- 11.3 Simulation Set-Up and Parameter Initialization -- 11.4 Results -- 11.5 Conclusion -- References -- 12 Improving Human Responses to Cyberdefense by Serious Gaming -- 12.1 Social Engineering and Information Security -- 12.2 Experiment -- 12.2.1 Pre-test Phase -- 12.2.2 Treatment -- 12.2.3 Post-test Phase -- 12.3 Effect Size and Marginal Analysis -- 12.4 Conclusion -- References -- 13 Next Generation Cyber-Physical Architecture and Training.

13.1 Mixed Reality Architecture -- 13.2 Zero Trust Architectures -- 13.3 Automated Defense -- References -- 14 Improving the Effectiveness of Cyberdefense Measures -- 14.1 Introduction -- 14.2 Model -- 14.2.1 Sequence Matching Procedure -- 14.2.2 Clustering Method -- 14.2.3 Network Analysis -- 14.3 Worked Example -- 14.4 Conclusion -- References -- Correction to: International Law and Cyber Defense Best Practices: The Way Forward -- Correction to: Chapter 15 in: M. M. Keupp (ed.), Cyberdefense, International Series in Operations Research &amp -- Management Science 342, https://doi.org/10.1007/978-3-031-30191-9_15 -- Correction to: International Law and Cyber Defense Best Practices: The Way Forward -- Correction to: Chapter 15 in: M. M. Keupp (ed.), Cyberdefense, International Series in Operations Research &amp -- Management Science 342, https://doi.org/10.1007/978-3-031-30191-9_15 -- 15 International Law and Cyber Defense Best Practices: The Way Forward -- 15.1 International Law and the Cyberspace -- 15.2 The Transformation Challenge -- 15.3 The Implementation Agenda -- 15.4 Conclusion -- References.

This book analyzes cyberdefense from a novel and interdisciplinary perspective, offering solutions for problems that have long impeded a more efficient defense. It explains why cyberdefense organized and performed by humans is too slow, too cumbersome, and too ineffective. Combining the analytical capabilities of experts in operations research and management, international security studies, economics, risk analysis, and defense management, the volume addresses these problems of current cyberdefense. The authors present suggestions for the next generation of cyberdefense, explaining why the future defense must focus on speeding up responses, why a single response may not be enough, and why effectiveness requires foresight.This makes the book a must-read for scholars, researchers, intelligence analysts, homeland security staff, and professionals who are interested in learning more about the issues of current cyberdefense, as well as solutions for the next generation of cyberdefense.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

اضغط على الصورة لمشاهدتها في عارض الصور

صورة الغلاف المحلية
شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة