Skip to main content
  • Book
  • © 2014

Cyberpatterns

Unifying Design Patterns with Security and Attack Patterns

  • Includes extended and updated papers from the First International Workshop on Cyberpatterns

  • Provides a broad introduction to this novel and fast-moving field

  • Contains both a research agenda and practical applications for cyberpatterns

  • Includes supplementary material: sn.pub/extras

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • ISBN: 978-3-319-04447-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book USD 119.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (21 chapters)

  1. Front Matter

    Pages i-xi
  2. Introduction

    1. Front Matter

      Pages 1-1
  3. Pattern Representation

    1. Front Matter

      Pages 35-36
  4. Introduction to Security Patterns

    1. Front Matter

      Pages 71-72
    2. Extending AOP Principles for the Description of Network Security Patterns

      • David Llewellyn-Jones, Qi Shi, Madjid Merabti
      Pages 73-84
    3. Management Patterns for Network Resilience: Design and Verification of Policy Configurations

      • Alberto Schaeffer-Filho, Paul Smith, Andreas Mauthe, David Hutchison
      Pages 85-95
    4. A Heuristic Approach for Secure Service Composition Adaptation

      • Bo Zhou, David Llewellyn-Jones, David Lamb, Muhammad Asim, Qi Shi, Madjid Merabti
      Pages 97-105
  5. Introduction to Attack Patterns

    1. Front Matter

      Pages 107-109
    2. Attack Pattern Recognition Through Correlating Cyber Situational Awareness in Computer Networks

      • Noor-ul-hassan Shirazi, Alberto Schaeffer-Filho, David Hutchison
      Pages 125-134
    3. A Method for Resolving Security Vulnerabilities Through the Use of Design Patterns

      • Nick Walker, Natalie Coull, Ian Ferguson, Allan Milne
      Pages 149-155
    4. ‘Weird Machine’ Patterns

      • Sergey Bratus, Julian Bangert, Alexandar Gabrovsky, Anna Shubina, Michael E. Locasto, Daniel Bilar
      Pages 157-171
  6. Socio-technical Aspects of Patterns

    1. Front Matter

      Pages 173-175
    2. Towards a Simulation of Information Security Behaviour in Organisations

      • Martin Ruskov, Paul Ekblom, M. Angela Sasse
      Pages 177-184

About this book

Cyberpatterns are predictable regularities in cyberspace helping us to design and implement more effective and secure systems, and to detect and respond to breaches, failures and deficiencies in operational systems.

Cyberpatterns is in its infancy and there are many challenges including:

  • Developing a scientific foundation of pattern-oriented research methods
  • Developing better engineering practice in novel application domains such as for cloud and cyberphysical systems
  • Constructing a sharable knowledge-base to aid education of students, design of novel systems and the development of automated design tools
  • Innovative applications of design patterns to pattern recognition and big data

Highlights:

  • Presents the state-of-the-art in the novel field of cyberpatterns
  • Demonstrates the application of patterns to cyber security and other key cyberspace domains
  • Supports the development of a sound scientific, engineering and mathematical foundation for cyberspace

This important new book provides an introduction to and coverage of the state-of-the-art of cyberpatterns, from a theoretical standpoint and via practical applications, bringing  together different interdisciplinary areas under one roof to portray a holistic view of the underlying principles and mechanisms of cyberpatterns.

Clive Blackwell is an Associate Lecturer at Oxford Brookes University specialising in cyber security and digital forensics

Hong Zhu is a Professor at Oxford Brookes University where he is Head of the Applied Formal Methods Research Group. He has a longstanding interest in design patterns and is the author of ‘Software design methodology: from principles to architectural styles’

Keywords

  • Aspect Oriented Programming
  • Attack and Defense Patterns
  • Complex Event Processing
  • Composition Patterns of Hacking
  • Cyber Situational Awareness
  • Design Patterns
  • Design Space
  • Enterprise Security Systems
  • Formal Methods
  • Memory Corruption
  • Network Resilience and Multi-level Resilience
  • Network Security
  • Pattern Representation
  • Policy Configuration
  • Secure Component Composition / Secure Service Composition
  • Software and Security Patterns

Reviews

From the book reviews:

“It is recommended reading for academics with an interest in the area. Its secondary audience would be security professionals and software developers. … This well-written book achieves its purposes--to describe the current state of research in the subject area and to outline directions for future research--quite well.” (Neil D. Burgess, Computing Reviews, September, 2014)

Editors and Affiliations

  • Department of Computing and Communication Technologies, Oxford Brookes University, Oxford, United Kingdom

    Clive Blackwell, Hong Zhu

Bibliographic Information

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • ISBN: 978-3-319-04447-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book USD 119.99
Price excludes VAT (USA)