Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Total Page:16
File Type:pdf, Size:1020Kb
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Junaid Ahmed Zubairi State University of New York at Fredonia, USA Athar Mahboob National University of Sciences & Technology, Pakistan Senior Editorial Director: Kristin Klinger Director of Book Publications: Julia Mosemann Editorial Director: Lindsay Johnston Acquisitions Editor: Erika Carter Development Editor: Michael Killian Production Editor: Sean Woznicki Typesetters: Adrienne Freeland Print Coordinator: Jamie Snavely Cover Design: Nick Newcomer Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2012 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Cyber security standards, practices and industrial applications: systems and methodologies / Junaid Ahmed Zubairi and Athar Mahboob, editors. p. cm. Includes bibliographical references and index. Summary: “This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)”--Provided by publisher. ISBN 978-1-60960-851-4 (hbk.) -- ISBN 978-1-60960-852-1 (ebook) -- ISBN 978-1-60960-853-8 (print & perpetual access) 1. Computer networks--Security measures. 2. Computer security. 3. Data protection. 4. Electronic data processing departments--Security measures. I. Zubairi, Junaid Ahmed, 1961- II. Mahboob, Athar, 1971- TK5105.59.C92 2012 005.8--dc22 2011009262 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. Editorial Advisory Board Kassem Saleh, Kuwait University, Kuwait Sajjad Madani, COMSATS Institute of Information Technology, Pakistan Badar Hussain, KCI Engineering, USA Omer Mahmoud, Int’l Islamic University, Malaysia List of Reviewers Alfredo Pironti, Politecnico di Torino, Torino, Italy Athar Mahboob, National University of Sciences & Technology, Pakistan Badar Hussain, KCI Engineering, USA Davide Pozza, Politecnico di Torino, Italy Junaid Ahmed Zubairi, State University of New York at Fredonia, USA Junaid Hussain, National University of Sciences & Technology, Pakistan Kashif Latif, National University of Sciences & Technology, Pakistan Morgan Henrie, Morgan Henrie Inc., USA Omer Mahmoud, Int’l Islamic University, Malaysia Riccardo Sisto, Politecnico di Torino, Italy Sajjad Ahmed Madani, COMSATS Institute of Information Technology, Pakistan Shakeel Ali, Cipher Storm Ltd., UK Sohail Sattar, NED University of Engineering & Technology, Pakistan Syed Ali Khayam, National University of Sciences & Technology, Pakistan Wen Chen Hu, University of North Dakota, USA Table of Contents Foreword ..............................................................................................................................................xii Preface .................................................................................................................................................xiii Acknowledgment ..............................................................................................................................xviii Section 1 Mobile and Wireless Security Chapter 1 Securing Wireless Ad Hoc Networks: State of the Art and Challenges .................................................. 1 Victor Pomponiu, University of Torino, Italy Chapter 2 Smartphone Data Protection Using Mobile Usage Pattern Matching .................................................. 23 Wen-Chen Hu, University of North Dakota, USA Naima Kaabouch, University of North Dakota, USA S. Hossein Mousavinezhad, Idaho State University, USA Hung-Jen Yang, National Kaohsiung Normal University, Taiwan Chapter 3 Conservation of Mobile Data and Usability Constraints ...................................................................... 40 Rania Mokhtar, University Putra Malaysia (UPM), Malaysia Rashid Saeed, International Islamic University Malaysia (IIUM), Malaysia Section 2 Social Media, Botnets and Intrusion Detection Chapter 4 Cyber Security and Privacy in the Age of Social Networks ................................................................. 57 Babar Bhatti, MutualMind, Inc., USA Chapter 5 Botnets and Cyber Security: Battling Online Threats ........................................................................... 75 Ahmed Mansour Manasrah, National Advanced IPv6 Center, Malaysia Omar Amer Abouabdalla, National Advanced IPv6 Center, Malaysia Moein Mayeh, National Advanced IPv6 Center, Malaysia Nur Nadiyah Suppiah, National Advanced IPv6 Center, Malaysia Chapter 6 Evaluation of Contemporary Anomaly Detection Systems (ADSs) ..................................................... 90 Ayesha Binte Ashfaq, National University of Sciences & Technology (NUST), Pakistan Syed Ali Khayam, National University of Sciences & Technology (NUST), Pakistan Section 3 Formal Methods and Quantum Computing Chapter 7 Practical Quantum Key Distribution ................................................................................................... 114 Sellami Ali, International Islamic University Malaysia (IIUM), Malaysia Chapter 8 Automated Formal Methods for Security Protocol Engineering ........................................................ 138 Alfredo Pironti, Politecnico di Torino, Italy Davide Pozza, Politecnico di Torino, Italy Riccardo Sisto, Politecnico di Torino, Italy Section 4 Embedded Systems and SCADA Security Chapter 9 Fault Tolerant Remote Terminal Units (RTUs) in SCADA Systems .................................................. 168 Syed Misbahuddin, Sir Syed University of Engineering and Technology, Pakistan Nizar Al-Holou, University of Detroit Mercy, USA Chapter 10 Embedded Systems Security ............................................................................................................... 179 Muhammad Farooq-i-Azam, COMSATS Institute of Information Technology, Pakistan Muhammad Naeem Ayyaz, University of Engineering and Technology, Pakistan Section 5 Industrial and Applications Security Chapter 11 Cyber Security in Liquid Petroleum Pipelines .................................................................................... 200 Morgan Henrie, MH Consulting, Inc., USA Chapter 12 Application of Cyber Security in Emerging C4ISR Systems and Related Technologies ................... 223 Ashfaq Ahmad Malik, National University of Sciences & Technology, Pakistan Athar Mahboob, National University of Sciences & Technology, Pakistan Adil Khan, National University of Sciences & Technology, Pakistan Junaid Zubairi, State University of New York at Fredonia, USA Chapter 13 Practical Web Application Security Audit Following Industry Standards and Compliance ............... 259 Shakeel Ali, Cipher Storm Ltd., UK Compilation of References ............................................................................................................... 280 About the Contributors .................................................................................................................... 303 Index ................................................................................................................................................... 310 Detailed Table of Contents Foreword ..............................................................................................................................................xii Preface .................................................................................................................................................xiii Acknowledgment ..............................................................................................................................xviii Section 1 Mobile and Wireless Security Chapter 1 Securing Wireless Ad Hoc Networks: State of the Art and Challenges .................................................. 1 Victor Pomponiu, University of Torino, Italy In this chapter, first authors introduce the main wireless technologies along with their characteristics. Then, a description of the attacks that can be mounted on these networks is given. A separate section will review and compare the most recent intrusion detection techniques for wireless ad hoc networks. Finally, based on the current state of the art, the conclusions, and major challenges are discussed. Chapter 2 Smartphone Data Protection Using Mobile Usage Pattern Matching .................................................. 23 Wen-Chen Hu, University of North Dakota, USA Naima Kaabouch, University of North Dakota, USA