Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Proactive and dynamic network defense
Wang C., Lu Z., Springer International Publishing, New York, NY, 2019. 264 pp. Type: Book (978-3-030105-96-9)
Date Reviewed: Nov 18 2019

The study of network security probably started together with the development of computer networks. Proactive and adaptive network defense techniques are newer approaches, based on an asymmetry between attackers and defenders. Typically, defenders maintain a largely static network infrastructure, which gives attackers ample time to study it in depth and then adjust their tools and techniques until they can successfully penetrate it. Proactive and adaptive network defense techniques seek to break this asymmetry, for example, by establishing a moving target, attacking back, or using network deception. However, the dynamic nature of these approaches requires the adoption of formal models to analyze the interplay between attackers and defenders in settings involving multiple players, stages, and levels of engagement.

According to its editors, this book comes out of an unspecified workshop that took place in 2017. It is structured as a collection of ten chapters complemented by a one-page preface. The topics covered are extremely diverse, ranging from methodological approaches based on cybersecurity dynamics, entropy, or game theory, to much more practical issues dealing with multi-vehicle systems, radio communications, and novel authentication techniques. Most chapters treat their subjects both with mathematical formalism and quantitative analysis. Each chapter’s abstract is refreshingly well written, providing a concise overview of its contribution.

Interestingly, according to the copyright information included with each chapter, all of the work described seems to be based on US government grants. Thus, the book is also a glimpse at what type of research the government is funding in this emerging area. The color printing considerably enhances the appeal and readability of many charts and diagrams. The book does not contain a unified index or bibliography; however, given the breadth of topics covered, this is not a big loss.

I would recommend this book to researchers and organizations wanting comprehensive coverage of this important subject. Other readers are better off downloading individual chapters from the publisher.

Reviewer:  D. Spinellis Review #: CR146778 (2001-0001)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Security and Protection (C.2.0 ... )
 
 
Network Architecture And Design (C.2.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy