Springer Book: Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools

   

The book Cybersecurity of Digital Service Chains Challenges, Methodologies, and Tools provides an overall review of the main concepts, architectures, technologies, and results from the GUARD project, covering both technical and non-technical aspects, i.e., legal and ethical issues. Structured into ten complementary chapters, the book presents the current trends in service automation, data protection, attack detection and analysis, business chain modelling, along with the practical examples of using GUARD and similar platforms. The ethical issues related to the Digital Business Chains are also discussed. The GUARD project partners co-author all chapters and GUARD collaborators from the PANELFIT H2020 project and the Cracow University of Technology, who have worked together through dedicated meetings, workshops, webinars and conferences.

We expect the book to be interesting for the broad group of researchers, engineers, and professionals working in computer science and IT business units using intelligent modelling to support their interdisciplinary projects and applications in distributed cloud systems and data-intensive computing domains. We believe they can find a valuable survey of the recent modelling technologies and compelling use cases.

Table of Contents
1.- A Reference Architecture for Management of Security Operations in Digital Service Chains
Alessandro Carrega, Giovanni Grieco, Domenico Striccoli, Manos Papoutsakis, Tomas Lima, José Ignacio Carretero et al. Link Springer
2.- Monitoring Network Flows in Containerized Environments
Matteo Repetto, Alessandro Carrega – Link Springer
3.- Intelligent Transportation Systems – Models, Challenges, Security Aspects
Joanna Kołodziej, Cornelio Hopmann, Giovanni Coppa, Daniel Grzonka, Adrian Widłak – Link Springer
4.- NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic
Mateusz Krzysztoń, Marcin Lew, Michał Marks – Link Springer
5.- Detecting Unknown Cyber Security Attacks Through System Behavior Analysis
Florian Skopik, Markus Wurzenberger, Max Landauer – Link Springer
6.- Signature-Based Detection of Botnet DDoS Attacks
Paweł Szynkiewicz – Link Springer
7.-Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation
Markus Wurzenberger, Max Landauer, Agron Bajraktari, Florian Skopik – Link Springer
8.- Blockchain-Based Task and Information Management in Computational Cloud Systems
Andrzej Wilczyński, Joanna Kołodziej – Link Springer
9.- Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them?
Denitsa Kozhuharova, Atanas Kirov, Zhanin Al-Shargabi – Link Springer
10.- A Discussion on Ethical Cybersecurity Issues in Digital Service Chains
Frédéric Tronnier, Sebastian Pape, Sascha Löbner, Kai Rannenberg – Link Springer

This book belongs to the series Lecture Notes in Computer Science (LNCS), including its subseries Lecture Notes in Artificial Intelligence (LNAI) and Lecture Notes in Bioinformatics (LNBI), has established itself as a medium for the publication of new developments in computer science and information technology research, teaching, and education.

DOI https://doi.org/10.1007/978-3-031-04036-8
Publisher: Springer Cham