Shaw / Priyambada Dash / Balamurugan | Digital Immune System | Buch | 978-1-394-38375-7 | www.sack.de

Buch, Englisch, 416 Seiten

Shaw / Priyambada Dash / Balamurugan

Digital Immune System

Principles and Practices
1. Auflage 2025
ISBN: 978-1-394-38375-7
Verlag: John Wiley & Sons Inc

Principles and Practices

Buch, Englisch, 416 Seiten

ISBN: 978-1-394-38375-7
Verlag: John Wiley & Sons Inc


Equip yourself with the knowledge to build a resilient digital infrastructure by understanding how the digital immune system leverages advanced technologies to proactively defend against cyber threats.

The concept of the digital immune system represents a significant advancement in cybersecurity, reflecting the industry’s shift toward more intelligent and adaptive defense mechanisms. Drawing inspiration from biological immune systems, the digital immune system offers a solution that naturally adapts and responds to evolving threats. This book explores this evolving landscape, focusing on the integration of advanced technologies like artificial intelligence, machine learning, and automation to build resilient digital infrastructures. It delves into how these technologies can create a self-sustaining ecosystem that detects, responds to, and mitigates cyber threats in real-time and highlights the significance of predictive analytics and behavioral analysis in identifying potential threats before they materialize. Through case studies and real-world examples, the book demonstrates how organizations have successfully implemented digital immune systems to protect their assets and maintain operational integrity in an increasingly hostile digital environment. Additionally, the book addresses the challenges and ethical considerations involved in deploying a digital immune system. It discusses the balance between security and privacy, the potential for false positives, and the need for transparency in automated decision-making processes. By providing a comprehensive overview of the current state and prospects of digital immunity, the book serves as a crucial resource for cybersecurity professionals, IT leaders, and anyone interested in understanding the next-generation of digital defense mechanisms.

Readers will find the book: Introduces the emergence of the digital immune system; Discusses different applications of the digital immune system across various industries; Comprehensively covers the fundamentals of the digital immune system for different domains, presenting state-of the-art analysis and real-world case studies; Examines the importance of a proactive approach to cybersecurity, emphasizing the need for organizations to move beyond traditional reactive measures.

Audience

Research scholars in computer science and AI, IT professionals, network administrators, cybersecurity and blockchain technology experts, engineering students and government research agencies looking to the future of cybersecurity.

Shaw / Priyambada Dash / Balamurugan Digital Immune System jetzt bestellen!

Weitere Infos & Material


Series Preface xxi

Preface xxiii

Acknowledgements xxvii

Part 1: Digital Immune System: Principles 1

1 Digital Immune System Approach Toward the Impact of Gig Faculty on Organizational Learning Within Higher Education Institutes 3
Nimisha Singh, Sonam Gupta and Anshu Yadav

1.1 Introduction 4

1.2 Literature Review 5

1.3 Methodology 8

1.4 Discussion and Conclusion 15

1.5 Conclusion: Underinvestment in Training, Professional Development, and Quality Assurance 16

1.6 Future Scope 17

References 20

2 The Economics of Implementing Digital Immune Systems 23
Ritesh Kumar Dubey and Prince Bhatia

2.1 Introduction 24

2.2 Economics of Implementing a Digital Immune System 27

2.3 Evolving Landscape of Digital Immune Systems 31

2.4 Conclusion 34

References 36

3 Blockchain-Based Digital Immune System for IoT Security with Adaptive Threat Detection and Automated Response 37
Chandra Priya Jayabal and Sujata Priyambada Dash

3.1 Introduction 38

3.2 Essential DIS Core Concepts 38

3.3 Related Works 40

3.4 Methodology 41

3.5 Experimental Setup 52

3.6 Conclusion and Future Scope 56

References 57

4 Blockchain Technology’s Potential Use in Decentralized Financial Services 59
Dileep Kumar Murala

4.1 Introduction 60

4.2 Related Works 64

4.3 Decentralized Finance Promises 68

4.4 The Main Business Models in Decentralized Finance 70

4.5 Tools, Methods, Services, and Blockchain-Based Financial Services Applications 73

4.6 Research Proposition 78

4.7 Limitations and Feature Scope 85

4.8 Conclusion 87

References 88

5 A Self-Tuning Digital Immune Cybersecurity Model for Manufacturing Industry 4.0 93
Vasamsheti Adarsh, Sashikala Parimi and Vaibhav Mishra

5.1 Introduction: Cybersecurity and Manufacturing Industry 4.0 in the Fourth Industrial Revolution 94

5.2 Significant Cybersecurity Challenges in Manufacturing Industry 4.0 95

5.3 Increased Attack Surface 96

5.4 Legacy Systems and Insecure Networks 96

5.5 Third Industrial Revolution Machine Control Systems – Industrial Control Systems and Supervisory Control and Data Acquisition Security 97

5.6 Supply Chain Vulnerabilities 98

5.7 Virus 98

5.8 Types of Malwares 98

5.9 Data Privacy and Intellectual Property Protection 99

5.10 Insider Threats 100

5.11 Challenging Stint for Cybersecurity in Manufacturing Industry 4.0 100

5.12 Self-Tuning Model 101

5.13 Self-Tuning Model Application and Functionality 103

5.14 Self-Tuning Model and Industry 4.0 103

5.15 Applications for Self-Tuning Models in Manufacturing Industry 4.0 105

5.16 Self-Tuning Model and Cybersecurity 105

5.17 Digital Immune System 107

5.18 Key Roles of Cybersecurity in the Digital Immune System 109

5.19 Self-Tuning Model Integrated into a Digital Immune System 110

5.20 Proposed Digital Immune Model 112

5.21 Conceptual Model Integrating Digital Immune Systems, Self-Tuning Models, Cybersecurity, and Manufacturing Industry 4.0 113

5.22 Interdependence of Cybersecurity, Self-Tuning Model, and Digital Immune System 114

5.23 Conclusion 116

References 116

Part 2: Digital Immune System: Applications 121

6 Integrating GANs for Enhanced Phishing Detection in Digital Immune Systems 123
Sherwin Akshay J. G., Hari Varshan S. R., Radhika G. and Radhika N.

6.1 Introduction 124

6.2 Literature Review 127

6.3 Rise of Machine Learning in Cybersecurity 130

6.4 Proposed Methodology 131

6.5 Comparative Analysis with Traditional Methods 133

6.6 Performance Evaluation and Benchmarking 135

6.7 Challenges and Future Trends 139

6.8 Results and Discussion 141

6.9 Conclusion 143

References 143

7 Managing Complexity in Cybersecurity: The Necessity of Human Oversight in Digital Immune Systems from Behavioral Forensic Perspective 145
Bhartrihari Pandiya and Prasad Kulkarni

7.1 Introduction 146

7.2 Literature Review 148

7.3 Case Studies Highlighting Human Oversight 151

7.4 Proposed Model 156

7.5 Conclusion 159

7.6 Managerial Implications 161

References 164

8 Ontologically Structured Methods for Evaluating Semantic Textual Similarity in Security Applications 167
Atul Gupta, Rohit Saxena, Vishal Nagar and Satyasundara Mahapatra

8.1 Introduction 168

8.2 Related Work Based on Topological Methodology 169

8.3 Methods of Semantic Similarity Computation 170

8.4 Hybrid Approach 173

8.5 String-Based Similarity 174

8.6 Similarity Based on Terms 175

8.7 Proposed Methodology 176

8.8 Results 178

8.9 Software Used for Computing Semantic Similarity 178

8.10 Conclusion 179

References 179

9 Building Human-Centric Cyber Resilience – The Role of HR Practices 183
Preshita Neha Tudu, Aparna Rani, Steffi L. and Chavali Akhila

9.1 Introduction 183

9.2 Cybersecurity and Cyber Resilience – Different or Same? 186

9.3 Does Cyber Resilience Bolster an Organization’s Cybersecurity? 188

9.4 The Evolving Role of Human Resources in Cyber Resilience and Data Protection 190

9.5 The Role of Human Resources in Building Cyber Resilient Organizations 193

9.6 The Future and Challenges of Human Resources and Cyber Resilience 203

9.7 Conclusion 206

References 207

10 Blockchain-Based Cybersecurity: A New Era of Data Protection 211
Sagiraju Harinadharaju, Manjunadh Muvva, Bvv Satyanarayana, Rithish Abinav and Pooja Mishra

10.1 Introduction 211

10.2 Fundamentals of Blockchain Technology 213

10.3 Blockchain for Data Security 216

10.4 Real-World Case Studies and Applications 218

10.5 Integration with Emerging Technologies 220

10.6 Economic, Environmental, and Social Implications 220

10.7 Regulatory, Legal, and Compliance Considerations 222

10.8 Challenges and Future Research Directions 222

10.9 Conclusions and Future Outlooks 223

References 225

Part 3: Digital Immune System: Novel Practices 229

11 Blockchain Technology and Intelligent Networking for the Metaverse 231
Dileep Kumar Murala, Pradosh Kumar Gantayat, Sandeep Kumar Panda and K. Vara Prasada Rao

11.1 Introduction 232

11.2 Blockchain for the Metaverse 233

11.3 Review of Existing Literature 240

11.4 Smart Network Architecture Using Blockchain 245

11.5 Blockchain Meets Intelligent Networking in the Metaverse 251

11.6 Challenges and Future Scope 256

11.7 Conclusion 258

References 259

12 Role of AI in Digital Immune Systems 269
Sanjay Fuloria

12.1 Introduction 270

12.2 Origin of Digital Immune Systems 271

12.3 Underlying Principles of Digital Immune Systems 272

12.4 Artificial Intelligence’s Expanding Role in Cybersecurity 273

12.5 Key Machine Learning Approaches in Digital Immune Systems 275

12.6 Deep Learning and Advanced Threat Identification 276

12.7 Artificial Immune Systems and Intrusion Detection 277

12.8 Real-Time Threat Intelligence and Automated Orchestration 278

12.9 Practical Examples and Case Studies 279

12.10 Core Implementation Challenges 280

12.11 Regulatory Constraints 281

12.12 Emerging Horizons and Research Directions 282

12.13 Federated Learning and Edge-Based AI 282

12.14 Harmonizing Automated Systems and Human Expertise 283

References 286

13 AI-Powered Cybersecurity for Next-Generation Threats 289
Suryadeep Kumar Mahto, Bharat Singh, Nidhi Kushwaha and Rajiv Kumar

13.1 Introduction 290

13.2 Overview of Digital Immune Systems 290

13.3 Key Machine Learning Algorithms for Digital Immunity 294

13.4 Key Artificial Intelligence-Driven Capabilities in Digital Immune Systems 296

13.5 Case Studies: Machine Learning-Powered Intrusion Detection Systems 300

13.6 Conclusion 302

References 302

14 Building Adaptive Digital Immune Systems: A Framework for Large-Scale Organizational Resilience 305
Shikha Gupta, Rajeev Kumar Ray, Amit Singh and Anuj Pal Kapoor

14.1 Introduction 306

14.2 Framework to Outcomes: Measuring Digital Immune Systems Effectiveness 307

14.3 Dimensions of Scalability in Digital Immune Systems 309

14.4 Architectural Principles for Scalable Digital Immune Systems 310

14.5 Data Governance and Analytics at Scale 312

14.6 Organizational Structures and Governance for Scaled Digital Immune Systems 314

14.7 Implementation Strategies for Enterprise-Scale Digital Immune Systems 316

14.8 Adapting Digital Immune Systems to Future Challenges and Technological Shifts 318

14.9 Conclusion 319

References 320

15 Blockchain-Based Drug Authentication: Leveraging zk-SNARKs and IPFS for Enhanced Security 323
R. M. Sabriesh Ram Kumar, L.R.S. Harjith, Binil Rohaan, Raghul Gandhi and Pooja Mishra

15.1 Introduction 324

15.2 Understanding Blockchain 325

15.3 Security in Digital Systems 327

15.4 Data Security in Blockchain 327

15.5 Introduction to Interplanetary File Systems 328

15.6 Introduction to Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge 329

15.7 Need for Blockchain in Drug Traceability 331

15.8 Implementation of Blockchain-Based Drug Traceability System 332

15.9 Advantages and Challenges of Blockchain in Drug Traceability 337

15.10 Future Scope 339

References 340

16 Privacy-Preserving and Scalable Authentication Using zk-SNARK-Based ZKP Blockchain PKI 343
Amrutanshu Panigrahi, Bibhuprasad Sahu, Abhilash Pati and Subrata Chowdhury

16.1 Introduction 344

16.2 Literature Survey 346

16.3 Background Study 350

16.4 Proposed Methodology 356

16.5 Workflow of the Proposed Public Key Infrastructure 359

16.6 Result and Analysis 362

16.7 Conclusion 365

References 366

Index 369


Sujata Priyambada Dash, PhD is an Assistant Professor in the Department of Management at the Birla Institute of Technology, Mesra, Ranchi, Jharkhand, India. She has published one edited book, several book chapters, and numerous articles in international journals and conferences.

Vaibhav Mishra, PhD is an Associate Professor at the ICFAI Business School Hyderabad, Telangana, India. He has published research articles in international journals of repute and edited books on blockchain, AI, and machine learning.

Bijeta Shaw, PhD is an Assistant Professor in the Operations and IT Department at ICFAI Business School Hyderabad, Telangana, India. She has authored numerous research articles in international journals and coordinated conferences.

Sandeep Kumar Panda, PhD is a Professor and the Associate Dean in the School of Science and Technology at the ICFAI Foundation for Higher Education Hyderabad, Telangana, India. He has published six edited books, several book chapters, and more than 80 articles in international journals and conferences.

S. Balamurugan, PhD is the Director of Research and Development at Intelligent Research Consultancy Services. He has published about 50 books, more than 300 articles in international journals and conferences, and 55 patents.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.