+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

New Age Cyber Threat Mitigation for Cloud Computing Networks

  • Book

  • June 2023
  • Bentham Science Publishers Ltd
  • ID: 5849382

Increasingly global and online social interactions and financial transactions involve digital data, computing devices and the internet. With cloud computing, remote computing, enterprise mobility and e-commerce on the rise, network security has become a priority. Selecting an appropriate algorithm and policy is a challenge for computer security engineers, as new technologies provide malicious users with opportunities to intrude into computer networks.

New Age Cyber Threat Mitigation for Cloud Computing Networks provides cloud and network engineers answers to cybersecurity challenges. It highlights new options, methodologies and feasible solutions that can be implemented in cloud architecture and IT Infrastructure, thereby securing end users. Chapters cover many topics related to cyber threats in the modern era.

These topics include:

  • Ransomware and DDoS attacks
  • Security algorithms
  • Design and implementation solutions for resilient and fault-tolerant cloud and network services
  • Security policy
  • End user data security
  • The book is an essential resource for anyone involved in cloud computing and network security, including learners, professionals and enthusiasts.

Table of Contents

Chapter 1 Ransomware Variants & Propagation

  • Crypto-Ransomware
  • Locker Ransomware
  • Ransomware Attack & Protection
  • Research Methodology
  • Proposed Malware Solution
  • Environment Setup
  • Malware Code Analysis Environment
  • Malware Reporting Environment
  • Results Obtained
  • Conclusion
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 2 Design a Resilient Network Infrastructure Security Policy Framework

  • Introduction
  • Information Security Policy
  • Stage #1: Security Policy Design
  • Stage #2: Security Policy Design
  • Proposed Network Security Policy Framework
  • Architectural Foundation Model
  • Operational Security Design
  • Research Work
  • Conclusion
  • Disclosure
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 3 Security Algorithms for Cloud Computing

  • Introduction
  • Asymmetric Algorithms
  • Rsa
  • Diffie-Hellman Key Exchange (D-H)
  • Symmetric Algorithms
  • Related Work Performed
  • Comparison Parameters
  • Performance Evaluation
  • Performance Results
  • Conclusion
  • Disclosure
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 4 Solutions for Ddos Attacks on Cloud Environment

  • Introduction
  • Reports and Trends
  • Types of Ddos Attacks
  • Proposed Solutions
  • On-Premise-Based Solution
  • Isp Ddos Solution
  • Scrubbing Defense Ddos Mitigation
  • Multi-Tiered Network Architecture
  • Conclusion
  • Disclosure
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 5 Three-Tier Network Architecture to Mitigate Ddos Attacks on Hybrid Cloud Environments

  • Introduction
  • Ddos Impact Analysis
  • Traditional Security V/S New-Age Ddos Attacks
  • Existing Ddos Solutions
  • On-Premise Based
  • Cloud-Based Security Services
  • Hybrid Cloud-Based Security
  • Proposed Ddos Solution
  • Infrastructure Setup
  • Parameters for Data Analysis
  • Performance Analysis
  • Single-Tier Network Architecture
  • Three-Tier Network Architecture
  • Conclusion
  • Disclosure
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 6 Review of Solutions for Securing End-User Data Over Cloud Applications

  • Introduction
  • Challenges in Cloud Computing
  • End-user Challenges in Cloud
  • Gaps Around End-user Computing Applications
  • Literature Review
  • Proposed Solutions to Cloud Data Security Issues
  • End-User Security Using Public Key Cryptography
  • Use Multi-Factor Authentication
  • Use of Cloud Aware Applications
  • Research Work Performed
  • Conclusion
  • Disclosure
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 7 Ddos Attacks, New Ddos Taxonomy, and Mitigation Solutions

  • Introduction
  • Related Work
  • As Per the Degree of Attack Automation
  • As Per Exploitation of Vulnerabilities
  • As Per Attack Rate Dynamics
  • As Per the Impact of Attacks
  • Review of Ddos Research
  • Effective Ddos Detection Parameters
  • Parameters for Ddos Countermeasure
  • Conclusion
  • Functionality - Be Able to Reduce, If Not Block, the Impact of the Ddos Attack, No Matter How Large or Powerful the Ddos Flood Attack is
  • Disclosure
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 8 Designing a Framework for Cloud Service Agreements for Cloud Environments

  • Introduction
  • Cloud Service Agreements Overview
  • Literature Review
  • Csa Metrics
  • Csa Metrics for Saas
  • Csa Metrics for Iaas
  • Csa Metrics for Paas
  • Csa Metrics for Staas
  • Proposed Framework for Cloud Service Agreement (Csa)
  • Conclusion
  • Disclosure
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 9 Comparing Single-Tier and Three-Tier Infrastructure Designs Against Ddos Attacks

  • Introduction
  • Literature Survey
  • Ddos Attack Implementation
  • Architecture Design and Implementation
  • Performance Analysis
  • Single Tier Logs and Data Analysis
  • Three-Tier Logs and Data Analysis
  • Performance Data Validation
  • Interpreting the T-Test Results
  • T-Test Validation for Average Icmp
  • T-Test Summary
  • Test Interpretation
  • T-Test Validation for Page Load Response
  • Test Interpretation
  • T-Test Summary for Browser Throughput Parameters
  • Test Interpretation
  • T-Test Summary for Application Server Response Parameters
  • T-Test Summary for Application Server Response Parameters
  • Test Interpretation
  • Conclusion
  • Disclosure
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 10 Email

  • Introduction
  • Limitations of Email Protocols
  • Literature Survey
  • Research Performed
  • Survey of Email Service Providers
  • Survey Results for Survey#
  • Survey of Email Practices by Users
  • Survey Results for Survey#
  • Survey of Email User Awareness
  • Survey Results for Survey#
  • Security Advantages of Cloud-Based Email Solutions
  • Conclusion
  • Discussions and Recommendation
  • Disclosure
  • Consent for Publication
  • Conflict of Interest
  • Acknowledgement
  • References

Chapter 11 Cloud

  • Introduction
  • Fault Tolerance for Cloud Environments
  • Literature Survey
  • Research Work
  • Fault Tolerance Assessment Algorithm"

Author

  • Akashdeep Bhardwaj