Skip to main content
  • Book
  • © 2017

Information Fusion for Cyber-Security Analytics

  • Helps readers understand how combining machine learning and reasoning techniques aids in creating attack prediction models with higher accuracy;
  • Provides information on utilizing several existing applications and tools to perform information fusion on machine learning tasks;
  • Presents readers with the tools to apply the learned knowledge daily cyber-security tasks.
  • Includes supplementary material: sn.pub/extras

Part of the book series: Studies in Computational Intelligence (SCI, volume 691)

Buy it now

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 chapters)

  1. Front Matter

    Pages i-x
  2. Using Contextual Information to Identify Cyber-Attacks

    • Ahmed AlEroud, George Karabatis
    Pages 1-16
  3. A Framework for Contextual Information Fusion to Detect Cyber-Attacks

    • Ahmed AlEroud, George Karabatis
    Pages 17-51
  4. Detecting Unknown Attacks Using Context Similarity

    • Ahmed AlEroud, George Karabatis
    Pages 53-75
  5. Unwanted Traffic Detection and Control Based on Trust Management

    • Zheng Yan, Raimo Kantola, Lifang Zhang, Yutan Ma
    Pages 77-109
  6. Characterization of Evolving Networks for Cybersecurity

    • Josephine M. Namayanja, Vandana P. Janeja
    Pages 111-127
  7. Cybercrime: Concerns, Challenges and Opportunities

    • George S. Oreku, Fredrick J. Mtenzi
    Pages 129-153
  8. Intrusion Prediction Systems

    • Mohamed Abdlhamed, Kashif Kifayat, Qi Shi, William Hurst
    Pages 155-174
  9. Analytics for Network Security: A Survey and Taxonomy

    • Kaj Grahn, Magnus Westerlund, Göran Pulkkis
    Pages 175-193
  10. Security in Wireless Sensor Networks (WSNs) and Their Applications

    • C. V. Anchugam, K. Thangadurai
    Pages 195-228
  11. Emerging Trends in Security System Design Using the Concept of Social Behavioural Biometrics

    • M. L. Gavrilova, F. Ahmed, S. Azam, P. P. Paul, W. Rahman, M. Sultana et al.
    Pages 229-251
  12. SDN-Based Real-Time IDS/IPS Alerting System

    • Izzat M. Alsmadi, Ahmed AlEroud
    Pages 297-306
  13. Digital Forensics: Implementation and Analysis for Google Android Framework

    • Harleen Kaur, Khairaj Ram Choudhary
    Pages 307-331
  14. A Systematic Literature Review on Software-Defined Networking

    • Izzat M. Alsmadi, Iyad AlAzzam, Mohammed Akour
    Pages 333-369
  15. Back Matter

    Pages 371-379

About this book

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.

Editors and Affiliations

  • Department of Computing and Cyber Security, University of Texas A&M, San Antonio, USA

    Izzat M Alsmadi

  • Department of Information Systems, University of Maryland Baltimore County (UMBC), Baltimore, USA

    George Karabatis

  • Department of Computer Information Systems, Yarmouk University, Irbid, Jordan

    Ahmed Aleroud

About the editors

Dr. Izzat Alsmadi is an Assistant Professor in the department of Computer Science at the University of New Haven. He has his master and PhD in Software Engineering from North Dakota State University. He has more than 100 conference and journal publications. His research interests include: Software security, software engineering, software testing, social networks and software defined networking.

Dr. George Karabatis is an Associate Professor of Information Systems and Associate Chair for Academic Affairs in the Department of Information Systems. He teaches undergraduate and graduate courses in semantic data integration, data management, data communications and networking, database applications, and mobile applications. He is one of the founding members of DINAMIC, a research group of IS faculty and students who pursue research in intelligent information discovery in various application domains. His research work has been published in peer-reviewed journals, conferenceproceedings and book chapters. He has been funded by NSF, USGS, MD Board of Elections, Northrop-Grumman and IGSR. He holds a Ph.D. in Computer Science from the University of Houston.

Dr. Ahmed AlEroud is an Assistant Professor of Computer Information Systems, at Yarmouk University in Jordan. He has recently joined UMBC as a Visiting Associate Research Scientist in the Department of Information Systems. Dr. AlEroud has received his PhD in Information Systems from the University of Maryland, Baltimore County (UMBC). His research appears in several cyber security and information systems conferences, such as the IEEE/ASE International conference in Cyber-Security, the IEEE conference on software Security and Reliability, and the International Conference on Semantic Computing.  He has served as a committee member and a reviewer in some conferences in several areas such as the first International Conference on Anti-Cybercrime (ICACC-2015) and the entropy Journal. p>

Bibliographic Information

  • Book Title: Information Fusion for Cyber-Security Analytics

  • Editors: Izzat M Alsmadi, George Karabatis, Ahmed Aleroud

  • Series Title: Studies in Computational Intelligence

  • DOI: https://doi.org/10.1007/978-3-319-44257-0

  • Publisher: Springer Cham

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: Springer International Publishing Switzerland 2017

  • Hardcover ISBN: 978-3-319-44256-3Published: 01 November 2016

  • Softcover ISBN: 978-3-319-83023-0Published: 16 June 2018

  • eBook ISBN: 978-3-319-44257-0Published: 21 October 2016

  • Series ISSN: 1860-949X

  • Series E-ISSN: 1860-9503

  • Edition Number: 1

  • Number of Pages: X, 379

  • Number of Illustrations: 24 b/w illustrations, 61 illustrations in colour

  • Topics: Communications Engineering, Networks, Circuits and Systems, Systems and Data Security, Big Data/Analytics

Buy it now

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access