Developing a cybersecurity immune system for industry 4.0 /
This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Gistrup, Denmark :
RIVER Publishers,
[2020]
|
Colección: | River Publishers series in security and digital forensics.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Foreword vii Preface xiii Acknowledgments xv
- List of Figures xvii
- List of Tables xxvii
- List of Abbreviations xxix Glossary xxxvii Introduction 1
- 1 Cyber Immunity Concept of the Industry 4.0
- 5 1.1 Cybersecurity Threat Landscape 6
- 1.2 Geography of the Cyber-Attacks 19
- 1.3 Biological Metaphor for Cyber Immunity of Industry 4.0
- 23
- 1.4 Prerequisites for the Creation of Cyber Immunity of Industry 4.0
- 28
- 1.5 An Even Older Immune Defense Organization 38
- 1.6 Place of the Immune System of Protection 45
- 1.7 Development of the Concept of Cyber Immunity of Industry 4.0
- 50
- 2 Mathematical Framework for Immune Protection of Industry 4.0
- 67
- 2.1 Known Mathematical Basis of Immune Protection 68
- 2.2 Known Immune Response Models 77
- 2.3 First Immune Response Software Systems 86
- 2.4 Problem of the "Digital Bombs" Neutralization 96
- 2.5 Program Faults Detection Method 108
- 2.6 Introducing a Passport System for Programs 118
- 2.7 "Digital Bombs" Neutralization Method 133
- 2.8 Basic Definitions of Cyber Resilience 148
- 2.9 Mathematical Formulation of the Cyber Resilience Control Problem 162
- 3 Trends and Prospects of the Development of Immune Protection of Industry 4.0
- 177
- 3.1 Artificial Immune Networks 178
- 3.2 Immunocomputing 190
- 3.3 Hybrid Intelligent Protection System 200
- 3.4 Detection of Anomalies Based on Dimensions 208
- 3.5 Innovative Methods for Detecting Anomalies 220
- 3.6 Data Processing Model on the Example of Oracle Solution 235
- 3.7 Control of the Platform Semantic Correctness 250
- 4 From the Detection of Cyber-Attacks to Self-Healing Industry 4.0
- 265
- 4.1 Classification of Methods for Detecting Cyber-Attacks and Anomalies 266
- 4.2 Evaluation of the Known Methods for Detecting Cyber-Attacks and Anomalies 275
- 4.3 Innovative Immune Response Method 287
- 4.4 Immune Response Method Implementation 300
- 4.5 Development of Immune Response Method 314
- 4.6 Intellectual Cyber Resilience Orchestration 323.
- 4.7 The Semantic Correctness Control 338
- 4.8 Organization of Self-Healing Computing 345
- 4.9 New Scientific and Practical Results 366 Conclusion 377
- References 379
- Index 405
- About the Author 409.