Table of contents : Cover Title Copyright End User License Agreement Contents Foreword Preface Ransomware: Rising Threat of New-Age Digital Extortion 1. INTRODUCTION 2. RANSOMWARE VARIANTS & PROPAGATION 2.1. Crypto-Ransomware 2.2. Locker Ransomware 3. RANSOMWARE ATTACK & PROTECTION 4. RESEARCH METHODOLOGY 5. PROPOSED MALWARE SOLUTION 5.1. Environment Setup 5.2. Malware Code Analysis Environment 5.3. Malware Reporting Environment 6. RESULTS OBTAINED CONCLUSION CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES Design A Resilient Network Infrastructure Security Policy Framework 1. INTRODUCTION 2. INFORMATION SECURITY POLICY 2.1. Stage #1: Security Policy Design 2.2. Stage #2: Security Policy Design 3. PROPOSED NETWORK SECURITY POLICY FRAMEWORK 3.1. Architectural Foundation Model 3.2. Operational Security Design 4. RESEARCH WORK CONCLUSION DISCLOSURE CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES Security Algorithms For Cloud Computing 1. INTRODUCTION 2. ASYMMETRIC ALGORITHMS 2.1. RSA 2.2. Diffie-Hellman Key Exchange (D-H) 3. SYMMETRIC ALGORITHMS 4. RELATED WORK PERFORMED 4.1. Comparison Parameters 4.2. Performance Evaluation 5. PERFORMANCE RESULTS CONCLUSION DISCLOSURE CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES Solutions for DDoS Attacks on Cloud Environment 1. INTRODUCTION 2. REPORTS AND TRENDS 2.1. Types of DDoS Attacks 3. PROPOSED SOLUTIONS 3.1. On-Premise-based Solution 3.2. ISP DDoS Solution 3.3. Scrubbing Defense DDoS Mitigation 4. MULTI-TIERED NETWORK ARCHITECTURE CONCLUSION DISCLOSURE CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES Three-tier Network Architecture to Mitigate DDoS Attacks on Hybrid Cloud Environments 1. INTRODUCTION 2. DDOS IMPACT ANALYSIS 3. TRADITIONAL SECURITY V/S NEW-AGE DDOS ATTACKS 4. EXISTING DDOS SOLUTIONS 4.1. On-premise Based 4.2. Cloud-Based Security Services 4.3. Hybrid Cloud-based Security 5. PROPOSED DDOS SOLUTION 5.1. Infrastructure Setup 5.2. Parameters For Data Analysis 5.3. Performance Analysis 5.3.1. Single-Tier Network Architecture 5.3.2. Three-Tier Network Architecture CONCLUSION DISCLOSURE CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES Review of Solutions for Securing End-User Data Over Cloud Applications 1. INTRODUCTION 2. CHALLENGES IN CLOUD COMPUTING 2.1. End User Challenges in Cloud 2.2. Gaps around End User Computing Applications 3. LITERATURE REVIEW 4. PROPOSED SOLUTIONS TO CLOUD DATA SECURITY ISSUES 4.1. End-user Security using Public Key Cryptography 4.2. Use Multi-factor Authentication 4.3. Use of Cloud Aware Applications 5. RESEARCH WORK PERFORMED CONCLUSION DISCLOSURE CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES DDoS Attacks, New DDoS Taxonomy, And Mitigation Solutions 1. INTRODUCTION 2. RELATED WORK 2.1. As per the Degree of Attack Automation 2.2. As per Exploitation of Vulnerabilities 2.3. As per Attack Rate Dynamics 2.4. As per the Impact of Attacks 3. REVIEW OF DDOS RESEARCH 4. EFFECTIVE DDOS DETECTION PARAMETERS 5. PARAMETERS FOR DDOS COUNTERMEASURE CONCLUSION • FUNCTIONALITY – BE ABLE TO REDUCE, IF NOT BLOCK, THE IMPACT OF THE DDOS ATTACK, NO MATTER HOW LARGE OR POWERFUL THE DDOS FLOOD ATTACK IS DISCLOSURE CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES Designing A Framework For Cloud Service Agreements For Cloud Environments 1. INTRODUCTION 2. CLOUD SERVICE AGREEMENTS OVERVIEW 3. LITERATURE REVIEW 4. CSA METRICS 4.1. CSA Metrics for SaaS 4.2. CSA Metrics for IaaS 4.3. CSA Metrics for PaaS 4.4. CSA Metrics for STaaS 4.5. Proposed Framework for Cloud Service Agreement (CSA) CONCLUSION DISCLOSURE CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES Comparing Single-Tier And Three-Tier Infrastructure Designs Against DDoS Attacks 1. INTRODUCTION 2. LITERATURE SURVEY 3. DDOS ATTACK IMPLEMENTATION 3.1. Architecture Design and Implementation 4. PERFORMANCE ANALYSIS 4.1. Single Tier Logs and Data Analysis 4.2. Three-Tier Logs and Data Analysis 5. PERFORMANCE DATA VALIDATION Interpreting the T-Test Results 5.1. T-Test Validation for Average ICMP T-Test Summary Test Interpretation 5.2. T-Test Validation for Page Load Response Test Interpretation 5.3. T-Test Summary for Browser Throughput Parameters Test Interpretation 5.4. T-Test Summary for Application Server Response Parameters 5.5. T-Test Summary for Application Server Response Parameters Test Interpretation CONCLUSION DISCLOSURE CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES Security Challenges For Cloud-Based Email Infrastructure 1. INTRODUCTION 2. LIMITATIONS OF EMAIL PROTOCOLS 3. LITERATURE SURVEY 4. RESEARCH PERFORMED 4.1. Survey of Email Service Providers Survey Results for Survey#1 4.2. Survey of Email Practices by Users Survey Results for Survey#2 4.3. Survey of Email User Awareness Survey Results for Survey#3 5. SECURITY ADVANTAGES OF CLOUD-BASED EMAIL SOLUTIONS CONCLUSION DISCUSSIONS AND RECOMMENDATION DISCLOSURE CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES Efficient Fault Tolerance in Cloud Environments 1. INTRODUCTION 2. FAULT TOLERANCE FOR CLOUD ENVIRONMENTS 3. LITERATURE SURVEY 4. RESEARCH WORK 4.1. Fault Tolerance Assessment Algorithm 4.2. Fault Tolerance Case Evaluations 4.3. Reliability for Cloud Models CONCLUSION FUTURE SCOPE DISCLOSURE CONSENT FOR PUBLICATION CONFLICT OF INTEREST ACKNOWLEDGEMENT REFERENCES Subject Index Back Cover