Computing Reviews

Proactive and dynamic network defense
Wang C., Lu Z., Springer International Publishing,New York, NY,2019. 264 pp.Type:Book
Date Reviewed: 11/18/19

The study of network security probably started together with the development of computer networks. Proactive and adaptive network defense techniques are newer approaches, based on an asymmetry between attackers and defenders. Typically, defenders maintain a largely static network infrastructure, which gives attackers ample time to study it in depth and then adjust their tools and techniques until they can successfully penetrate it. Proactive and adaptive network defense techniques seek to break this asymmetry, for example, by establishing a moving target, attacking back, or using network deception. However, the dynamic nature of these approaches requires the adoption of formal models to analyze the interplay between attackers and defenders in settings involving multiple players, stages, and levels of engagement.

According to its editors, this book comes out of an unspecified workshop that took place in 2017. It is structured as a collection of ten chapters complemented by a one-page preface. The topics covered are extremely diverse, ranging from methodological approaches based on cybersecurity dynamics, entropy, or game theory, to much more practical issues dealing with multi-vehicle systems, radio communications, and novel authentication techniques. Most chapters treat their subjects both with mathematical formalism and quantitative analysis. Each chapter’s abstract is refreshingly well written, providing a concise overview of its contribution.

Interestingly, according to the copyright information included with each chapter, all of the work described seems to be based on US government grants. Thus, the book is also a glimpse at what type of research the government is funding in this emerging area. The color printing considerably enhances the appeal and readability of many charts and diagrams. The book does not contain a unified index or bibliography; however, given the breadth of topics covered, this is not a big loss.

I would recommend this book to researchers and organizations wanting comprehensive coverage of this important subject. Other readers are better off downloading individual chapters from the publisher.

Reviewer:  D. Spinellis Review #: CR146778 (2001-0001)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy