Cargando…

Developing a cybersecurity immune system for industry 4.0 /

This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Petrenko, Sergei (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Gistrup, Denmark : RIVER Publishers, [2020]
Colección:River Publishers series in security and digital forensics.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Foreword vii Preface xiii Acknowledgments xv
  • List of Figures xvii
  • List of Tables xxvii
  • List of Abbreviations xxix Glossary xxxvii Introduction 1
  • 1 Cyber Immunity Concept of the Industry 4.0
  • 5 1.1 Cybersecurity Threat Landscape 6
  • 1.2 Geography of the Cyber-Attacks 19
  • 1.3 Biological Metaphor for Cyber Immunity of Industry 4.0
  • 23
  • 1.4 Prerequisites for the Creation of Cyber Immunity of Industry 4.0
  • 28
  • 1.5 An Even Older Immune Defense Organization 38
  • 1.6 Place of the Immune System of Protection 45
  • 1.7 Development of the Concept of Cyber Immunity of Industry 4.0
  • 50
  • 2 Mathematical Framework for Immune Protection of Industry 4.0
  • 67
  • 2.1 Known Mathematical Basis of Immune Protection 68
  • 2.2 Known Immune Response Models 77
  • 2.3 First Immune Response Software Systems 86
  • 2.4 Problem of the "Digital Bombs" Neutralization 96
  • 2.5 Program Faults Detection Method 108
  • 2.6 Introducing a Passport System for Programs 118
  • 2.7 "Digital Bombs" Neutralization Method 133
  • 2.8 Basic Definitions of Cyber Resilience 148
  • 2.9 Mathematical Formulation of the Cyber Resilience Control Problem 162
  • 3 Trends and Prospects of the Development of Immune Protection of Industry 4.0
  • 177
  • 3.1 Artificial Immune Networks 178
  • 3.2 Immunocomputing 190
  • 3.3 Hybrid Intelligent Protection System 200
  • 3.4 Detection of Anomalies Based on Dimensions 208
  • 3.5 Innovative Methods for Detecting Anomalies 220
  • 3.6 Data Processing Model on the Example of Oracle Solution 235
  • 3.7 Control of the Platform Semantic Correctness 250
  • 4 From the Detection of Cyber-Attacks to Self-Healing Industry 4.0
  • 265
  • 4.1 Classification of Methods for Detecting Cyber-Attacks and Anomalies 266
  • 4.2 Evaluation of the Known Methods for Detecting Cyber-Attacks and Anomalies 275
  • 4.3 Innovative Immune Response Method 287
  • 4.4 Immune Response Method Implementation 300
  • 4.5 Development of Immune Response Method 314
  • 4.6 Intellectual Cyber Resilience Orchestration 323.
  • 4.7 The Semantic Correctness Control 338
  • 4.8 Organization of Self-Healing Computing 345
  • 4.9 New Scientific and Practical Results 366 Conclusion 377
  • References 379
  • Index 405
  • About the Author 409.