Description |
1 online resource. |
|
text file |
Series |
River Publishers Series in Security and Digital Forensics
|
|
River Publishers series in security and digital forensics.
|
Bibliography |
Includes bibliographical references and index. |
Summary |
This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks. |
Contents |
Foreword vii Preface xiii Acknowledgments xv -- List of Figures xvii -- List of Tables xxvii -- List of Abbreviations xxix Glossary xxxvii Introduction 1 -- 1 Cyber Immunity Concept of the Industry 4.0 -- 5 1.1 Cybersecurity Threat Landscape 6 -- 1.2 Geography of the Cyber-Attacks 19 -- 1.3 Biological Metaphor for Cyber Immunity of Industry 4.0 -- 23 -- 1.4 Prerequisites for the Creation of Cyber Immunity of Industry 4.0 -- 28 -- 1.5 An Even Older Immune Defense Organization 38 -- 1.6 Place of the Immune System of Protection 45 -- 1.7 Development of the Concept of Cyber Immunity of Industry 4.0 -- 50 -- 2 Mathematical Framework for Immune Protection of Industry 4.0 -- 67 -- 2.1 Known Mathematical Basis of Immune Protection 68 -- 2.2 Known Immune Response Models 77 -- 2.3 First Immune Response Software Systems 86 -- 2.4 Problem of the "Digital Bombs" Neutralization 96 -- 2.5 Program Faults Detection Method 108 -- 2.6 Introducing a Passport System for Programs 118 -- 2.7 "Digital Bombs" Neutralization Method 133 -- 2.8 Basic Definitions of Cyber Resilience 148 -- 2.9 Mathematical Formulation of the Cyber Resilience Control Problem 162 -- 3 Trends and Prospects of the Development of Immune Protection of Industry 4.0 -- 177 -- 3.1 Artificial Immune Networks 178 -- 3.2 Immunocomputing 190 -- 3.3 Hybrid Intelligent Protection System 200 -- 3.4 Detection of Anomalies Based on Dimensions 208 -- 3.5 Innovative Methods for Detecting Anomalies 220 -- 3.6 Data Processing Model on the Example of Oracle Solution 235 -- 3.7 Control of the Platform Semantic Correctness 250 -- 4 From the Detection of Cyber-Attacks to Self-Healing Industry 4.0 -- 265 -- 4.1 Classification of Methods for Detecting Cyber-Attacks and Anomalies 266 -- 4.2 Evaluation of the Known Methods for Detecting Cyber-Attacks and Anomalies 275 -- 4.3 Innovative Immune Response Method 287 -- 4.4 Immune Response Method Implementation 300 -- 4.5 Development of Immune Response Method 314 -- 4.6 Intellectual Cyber Resilience Orchestration 323. |
|
4.7 The Semantic Correctness Control 338 -- 4.8 Organization of Self-Healing Computing 345 -- 4.9 New Scientific and Practical Results 366 Conclusion 377 -- References 379 -- Index 405 -- About the Author 409. |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Computer security.
|
|
Computer security. |
Other Form: |
Print version: 877022188X 9788770221887 (OCoLC)1149308515 |
ISBN |
9788770221870 (electronic book) |
|
8770221871 (electronic book) |
|
877022188X |
|
9788770221887 |
|