Cover image for Computational intelligence in information assurance and security
Title:
Computational intelligence in information assurance and security
Series:
Studies in computational intelligence ; 57
Publication Information:
New York, NY : Springer, 2007
Physical Description:
xx, 254 p. : ill. ; c2007
ISBN:
9783540710776
General Note:
Also available in online version
Electronic Access:
Full Text

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010151755 Q342 C657 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. It details current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world problems using computational intelligence.


Table of Contents

E.C. Laskari and G.C. Meletiou and Y.C. Stamatiou and M.N. VrahatisShiguo LianNadia Nedjah and Luiza de Macedo MourellePaolo Mercorelli and Alexander FrickKi-Won YeomLuc Longpré and Vladik KreinovichChengfeng Wang and Yuan Luo and Marina L. Gavrilova and Jon RokneKostas Markantonakis and Keith Mayes and Michael Tunstall and Damien Sauveron Fred PiperSangkyun Kim
1 Cryptography and Cryptanalysis Through Computational Intelligencep. 1
1.1 Introductionp. 2
1.1.1 Block ciphersp. 2
1.1.2 Public key cryptographic schemesp. 5
1.1.3 Elliptic Curve based cryptosystemsp. 7
1.2 Computational Intelligence Background and Methodsp. 8
1.2.1 Evolutionary Computationp. 8
1.2.2 Artificial Neural Networksp. 13
1.2.3 Fuzzy systemsp. 15
1.3 Review of Cryptography and Cryptanalysis Through Computational Intelligencep. 16
1.4 Applying Computational Intelligence in Cryptanalysisp. 18
1.4.1 Cryptanalysis as Discrete Optimization Taskp. 18
1.4.2 Cryptanalysis of Feistel Ciphers through Evolutionary Computation Methodsp. 23
1.4.3 Utilizing Artificial Neural Networks to Address Cryptographic Problemsp. 31
1.4.4 Artificial Neural Networks Applied on Problems Related to Elliptic Curve Cryptographyp. 34
1.5 Ridge Polynomial Networks for Cryptographyp. 37
1.6 Summaryp. 42
Referencesp. 43
2 Multimedia Content Protection Based on Chaotic Neural Networksp. 51
2.1 Introductionp. 52
2.2 Chaotic neural networks' generation and propertiesp. 54
2.2.1 Chaotic neural network's generationp. 54
2.2.2 Chaotic neural network's properties suitable for data encryptionp. 55
2.3 Multimedia content encryption based on chaotic neural networksp. 59
2.3.1 Introduction to multimedia content encryptionp. 59
2.3.2 The cipher based on chaotic neural networkp. 60
2.3.3 Selective video encryption based on Advanced Video Codingp. 64
2.4 Multimedia content authentication based on chaotic neural networksp. 66
2.4.1 Introduction to multimedia content authenticationp. 66
2.4.2 The hash function based on chaotic neural networkp. 67
2.4.3 The proposed image authentication schemep. 69
2.4.4 Performance analysisp. 70
2.5 Future work and discussionsp. 73
2.6 Conclusionsp. 74
2.7 Acknowledgementsp. 75
Referencesp. 75
3 Evolutionary Regular Substitution Boxesp. 79
3.1 Introductionp. 79
3.2 Preliminaries for Substitution Boxesp. 80
3.3 Nash Equilibrium-based Evolutionary Algorithmsp. 82
3.4 Evolving Resilient S-Boxesp. 82
3.4.1 S-Box encoding and genetic operatorsp. 83
3.4.2 S-Box evaluationp. 84
3.5 Performance Resultsp. 87
3.6 Conclusionp. 88
Referencesp. 88
4 Industrial Applications Using Wavelet Packets for Gross Error Detectionp. 89
4.1 Introductionp. 90
4.1.1 Modulesp. 91
4.1.2 Gross Error Types and Examplesp. 93
4.2 Problem Specificationp. 95
4.2.1 Mathematical Preliminaryp. 95
4.2.2 Noise Level Detection Problem (NLDP) and Algorithm (NLDA)p. 97
4.2.3 Some Remarks Regarding Wavelet Based Algorithmsp. 97
4.3 Wavelet Based Noise Level Determinationp. 97
4.3.1 Background and State of the Artp. 98
4.3.2 Noise Level Estimation: State of the Artp. 99
4.3.3 The Proposed New Procedure for Peak-Noise Level Detectionp. 100
4.3.4 Validation of Peak Noise Level Estimationp. 103
4.4 The Wavelet Algorithm for GEDRp. 106
4.4.1 Validation and Simulationsp. 109
4.4.2 Outlier Detection Algorithm: MAD Algorithmp. 110
4.5 Resultsp. 111
4.5.1 Algorithm Parameterizationp. 114
4.6 Experimental Data Sourcesp. 116
4.6.1 Dryer, Distillation and Mining Data with Outliersp. 118
4.6.2 Artificially Contaminated Data and Off-line, On-line Modep. 122
4.7 Summary, Conclusions and Outlookp. 125
Referencesp. 126
5 Immune-inspired Algorithm for Anomaly Detectionp. 129
5.1 Introductionp. 129
5.2 Backgroundp. 131
5.2.1 The Danger Theoryp. 131
5.2.2 Dendritic Cells as Initiator of Primary Immune Responsep. 133
5.3 IDS based on Danger Theory and DCs Propertiesp. 136
5.3.1 Properties of DCs for IDSp. 136
5.3.2 Abstraction of Anomaly Detection Algorithmp. 138
5.4 DCs based Implementation of Practical Applicationsp. 141
5.4.1 A Detection of DoM Attackp. 142
5.4.2 Experiments and Resultsp. 145
5.4.3 A Detection of Port Scan Attackp. 147
5.4.4 Experiments and Resultsp. 149
5.5 Conclusionp. 153
Referencesp. 153
6 How to Efficiently Process Uncertainty within a Cyberinfrastructure without Sacrificing Privacy and Confidentialityp. 155
6.1 Cyberinfrastructure and Web Servicesp. 155
6.1.1 Practical Problemp. 155
6.1.2 Centralization of Computational Resourcesp. 156
6.1.3 Cyberinfrastructurep. 156
6.1.4 What Is Cyberinfrastructure: The Official NSF Definitionp. 157
6.1.5 Web Services: What They Do - A Brief Summaryp. 157
6.2 Processing Uncertainty Within a Cyberinfrastructurep. 158
6.2.1 Formulation of the problemp. 158
6.2.2 Description of uncertainty: general formulasp. 160
6.2.3 Error Estimation for the Results of Data Processingp. 162
6.2.4 How This Problem Is Solved Nowp. 162
6.3 Need for Privacy Makes the Problem More Complexp. 162
6.4 Solution for Statistical Setting: Monte-Carlo Simulationsp. 164
6.5 Solution for Interval and Fuzzy Settingp. 165
6.6 Summaryp. 169
Referencesp. 170
7 Fingerprint Recognition Using a Hierarchical Approachp. 175
7.1 Introductionp. 175
7.2 Coarse Fingerprint Matchingp. 179
7.2.1 Fingerprint Foreground Segmentationp. 180
7.2.2 Singular Points Extractionp. 181
7.2.3 Singular Points Matchingp. 185
7.3 Topology-based Fine Matchingp. 185
7.3.1 Delaunay Triangulation of Minutiae Setp. 188
7.3.2 Modeling Fingerprint Deformationp. 190
7.3.3 Maximum Bipartite Matchingp. 192
7.4 Experimental Resultsp. 194
7.5 Conclusionsp. 197
Referencesp. 198
8 Smart Card Securityp. 201
8.1 Introductionp. 201
8.2 Smart Card Specific Attacksp. 203
8.2.1 Side Channel Attacksp. 203
8.2.2 Fault Attacksp. 209
8.3 Smart Card Platform Securityp. 214
8.3.1 The Evolution of Smart Card Platformsp. 214
8.3.2 The Different Multi-application smart card Platformsp. 215
8.3.3 Java Cardp. 217
8.3.4 Java Card Securityp. 219
8.4 GSM and 3G Securityp. 221
8.4.1 1G - TACSp. 222
8.4.2 2G - GSMp. 222
8.4.3 3G - UMTSp. 226
8.5 Summaryp. 228
Referencesp. 229
9 Governance of Information Security: New Paradigm of Security Managementp. 235
9.1 Introductionp. 236
9.2 Rise of the Governancep. 237
9.2.1 Definitions of the Governancep. 237
9.2.2 Implications of the Governancep. 238
9.2.3 Success Factors of the Governancep. 239
9.3 Why the Security Management Failsp. 240
9.3.1 What the Security Management Can Dop. 240
9.3.2 What the Security Management Cannot Dop. 242
9.4 Governance of Corporate Securityp. 244
9.4.1 General Frameworks for the Governancep. 244
9.4.2 Integrated Framework for the Governance of Corporate Securityp. 244
9.5 Summaryp. 251
Referencesp. 252
Author Indexp. 255