Skip to main content
  • Book
  • Open Access
  • © 2022

Cybersecurity of Digital Service Chains

Challenges, Methodologies, and Tools

  • This book is open access, which means that you have free and unlimited access

  • For persons engaged with modern computing environments and cyber-physical systems

  • This book fills the gap between software management paradigms and cybersecurity models

  • Provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13300)

Buying options

Softcover Book USD 49.99
Price excludes VAT (USA)
  • ISBN: 978-3-031-04035-1
  • Dispatched in 3 to 5 business days
  • Exclusive offer for individuals only
  • Free shipping worldwide
    See shipping information.
  • Tax calculation will be finalised during checkout

Table of contents (10 chapters)

  1. Front Matter

    Pages i-xi
  2. A Reference Architecture for Management of Security Operations in Digital Service Chains

    • Alessandro Carrega, Giovanni Grieco, Domenico Striccoli, Manos Papoutsakis, Tomas Lima, José Ignacio Carretero et al.
    Pages 1-31Open Access
  3. Monitoring Network Flows in Containerized Environments

    • Matteo Repetto, Alessandro Carrega
    Pages 32-55Open Access
  4. Intelligent Transportation Systems – Models, Challenges, Security Aspects

    • Joanna Kołodziej, Cornelio Hopmann, Giovanni Coppa, Daniel Grzonka, Adrian Widłak
    Pages 56-82Open Access
  5. NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic

    • Mateusz Krzysztoń, Marcin Lew, Michał Marks
    Pages 83-102Open Access
  6. Detecting Unknown Cyber Security Attacks Through System Behavior Analysis

    • Florian Skopik, Markus Wurzenberger, Max Landauer
    Pages 103-119Open Access
  7. Signature-Based Detection of Botnet DDoS Attacks

    • Paweł Szynkiewicz
    Pages 120-135Open Access
  8. Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation

    • Markus Wurzenberger, Max Landauer, Agron Bajraktari, Florian Skopik
    Pages 136-161Open Access
  9. Blockchain-Based Task and Information Management in Computational Cloud Systems

    • Andrzej Wilczyński, Joanna Kołodziej
    Pages 162-201Open Access
  10. Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them?

    • Denitsa Kozhuharova, Atanas Kirov, Zhanin Al-Shargabi
    Pages 202-221Open Access
  11. A Discussion on Ethical Cybersecurity Issues in Digital Service Chains

    • Frédéric Tronnier, Sebastian Pape, Sascha Löbner, Kai Rannenberg
    Pages 222-256Open Access
  12. Back Matter

    Pages 257-257

About this book

This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios.

We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems.

Keywords

  • cloud computing
  • computer crime
  • computer networks
  • computer security
  • cryptography
  • cyber security
  • data communication systems
  • data flow architectures
  • data management systems
  • data security
  • electromagnetic interference and compatibility
  • general programming languages
  • health informatics
  • intrusion detection
  • network protocols
  • network security
  • network simulations
  • sensors and actuators
  • signal processing
  • telecommunication traffic

Editors and Affiliations

  • Naukowa i Akademicka Sieć Komputerowa - Państwowy Instytut Badawczy (NASK-PIB), Warsaw, Poland

    Joanna Kołodziej

  • Consiglio Nazionale delle Ricerche (IMAT-CNR), Genoa, Italy

    Matteo Repetto

  • Maggioli Informatica, Santarcangelo di Romagna, Italy

    Armend Duzha

Bibliographic Information

Buying options

Softcover Book USD 49.99
Price excludes VAT (USA)
  • ISBN: 978-3-031-04035-1
  • Dispatched in 3 to 5 business days
  • Exclusive offer for individuals only
  • Free shipping worldwide
    See shipping information.
  • Tax calculation will be finalised during checkout