000806703 000__ 05777cam\a2200541Ii\4500 000806703 001__ 806703 000806703 005__ 20230306143830.0 000806703 006__ m\\\\\o\\d\\\\\\\\ 000806703 007__ cr\cn\nnnunnun 000806703 008__ 170104s2017\\\\sz\\\\\\ob\\\\001\0\eng\d 000806703 019__ $$a967767528$$a974651024$$a981863539$$a1005832610$$a1011950408 000806703 020__ $$a9783319489476$$q(electronic book) 000806703 020__ $$a331948947X$$q(electronic book) 000806703 020__ $$z9783319489469 000806703 020__ $$z3319489461 000806703 0247_ $$a10.1007/978-3-319-48947-6$$2doi 000806703 035__ $$aSP(OCoLC)ocn967656012 000806703 035__ $$aSP(OCoLC)967656012$$z(OCoLC)967767528$$z(OCoLC)974651024$$z(OCoLC)981863539$$z(OCoLC)1005832610$$z(OCoLC)1011950408 000806703 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dEBLCP$$dIDEBK$$dGW5XE$$dN$T$$dYDX$$dOCLCF$$dNJR$$dCNCGM$$dUPM$$dZ5A$$dOCLCQ$$dVT2$$dOCLCA$$dUAB 000806703 049__ $$aISEA 000806703 050_4 $$aQA76.9.A25 000806703 08204 $$a005.8$$223 000806703 24500 $$aInformation security practices :$$bemerging threats and perspectives /$$cIssa Traoré, Ahmed Awad, Isaac Woungang, editors. 000806703 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2017] 000806703 300__ $$a1 online resource 000806703 336__ $$atext$$btxt$$2rdacontent 000806703 337__ $$acomputer$$bc$$2rdamedia 000806703 338__ $$aonline resource$$bcr$$2rdacarrier 000806703 347__ $$atext file$$bPDF$$2rda 000806703 504__ $$aIncludes bibliographical references and index. 000806703 5050_ $$aPreface; Contents; Chapter 1: Introduction: Emerging Threats Call for New Security Paradigms; 1.1 Emerging Threats Landscape; 1.2 Next Generation Cybersecurity Systems; References; Chapter 2: Botnets Threat Analysis and Detection; 2.1 Introduction; 2.2 Evolution of Botnets: History and Topologies; 2.3 Famous Botnets; 2.3.1 ZeuS or Zbot; 2.3.2 Koobface; 2.3.3 Windigo; 2.4 Botnet Detection Evasion Techniques; 2.5 Botnet Detection Methodologies; 2.5.1 Passive Techniques; 2.5.1.1 Packet Inspection; 2.5.1.2 Analysis of Flow Records; 2.5.1.3 DNS-Based Approaches; 2.5.1.4 Analysis of Spam Records. 000806703 5058_ $$a2.5.1.5 Analysis of (Application) Log Files2.5.1.6 Honeypots; 2.5.1.7 Evaluation of Antivirus; 2.5.1.8 Software Feedback; 2.5.2 Active Techniques; 2.5.2.1 Sinkholing; 2.5.2.2 DNS Cache Snooping; 2.5.2.3 Infiltration; 2.5.2.4 Tracking of Fast-Flux Network; 2.6 Defense Against Botnet Using Network Security Devices; 2.6.1 Intrusion Prevention and Detection Systems; 2.6.2 Network Firewalls; 2.6.2.1 Dynamic and Administrator Blacklist Data; 2.6.2.2 Traffic Classification and Reporting; 2.6.2.3 Domain Name System Snooping; 2.7 Security Measures Against Botnets; 2.7.1 Network Design. 000806703 5058_ $$a2.7.1.1 Advance Threat Protection2.7.1.2 Intrusion Prevention and Detection System; 2.7.1.3 Email Security Systems; 2.7.1.4 Forensic Analysis; 2.7.1.5 Security Event Monitoring; 2.7.2 Application Usage; 2.7.2.1 HIPS (Host-Based Intrusion Prevention System); 2.7.2.2 End Point Security; 2.7.2.3 Application Firewall; 2.8 Conclusion; References; Chapter 3: Collective Framework for Fraud Detection Using Behavioral Biometrics; 3.1 Background; 3.2 Fraud Detection Framework; 3.3 Behavioral Identity Verification; 3.4 Experimental Evaluation; 3.4.1 Evaluation Metrics and Procedures; 3.4.2 Results. 000806703 5058_ $$a3.5 ConclusionReferences; Chapter 4: The Hardware Trojan System: An Online Suite of Tools for Hardware Trojan Analysis; 4.1 Introduction; 4.2 Hardware Trojan Analysis Techniques; 4.2.1 Trojan Classification; 4.2.2 Trojan Evaluation; 4.3 The Hardware Trojan System; 4.3.1 The Classification Tool; 4.3.2 The Evaluation Tool; 4.3.3 The Web Environment; 4.4 Case Study; 4.4.1 Classification Tool; 4.4.2 Evaluation Tool; 4.5 Conclusion; References; Chapter 5: Combining Mouse and Eye Movement Biometrics for User Authentication; 5.1 Introduction; 5.2 Related Work. 000806703 5058_ $$a5.2.1 Previous Research on Mouse Movements5.2.2 Previous Research on Eye Movements; 5.3 Experiment Setting and Design; 5.3.1 Experiment Setting; 5.3.2 Participants; 5.3.3 Experiment Design; 5.3.4 Experiment Procedure; 5.4 Data Processing and Feature Extraction; 5.4.1 Data Alignment; 5.4.2 Data Cleaning; 5.4.3 Data Visualization; 5.4.4 Feature Extraction; 5.5 Proposed Approaches; 5.5.1 Simple Multi-class Classification Model; 5.5.2 Binary Classification Model; 5.5.3 Regression Model Using Fusion; 5.6 Result and Discussion; 5.7 Conclusion and Future Research Direction; References. 000806703 506__ $$aAccess limited to authorized users. 000806703 520__ $$aThis book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. 000806703 588__ $$aOnline resource; title from PDF title page (viewed February 9, 2017). 000806703 650_0 $$aComputer security. 000806703 650_0 $$aComputer networks$$xSecurity measures. 000806703 7001_ $$aTraoré, Issa,$$eeditor. 000806703 7001_ $$aAwad, Ahmed,$$eeditor. 000806703 7001_ $$aWoungang, Isaac,$$eeditor. 000806703 77608 $$iPrint version:$$tInformation security practices.$$dCham, Switzerland : Springer, [2017]$$z3319489461$$z9783319489469$$w(OCoLC)959950255 000806703 852__ $$bebk 000806703 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-48947-6$$zOnline Access$$91397441.1 000806703 909CO $$ooai:library.usi.edu:806703$$pGLOBAL_SET 000806703 980__ $$aEBOOK 000806703 980__ $$aBIB 000806703 982__ $$aEbook 000806703 983__ $$aOnline 000806703 994__ $$a92$$bISE