SlideShare a Scribd company logo
Cyber Security for next generation Computing
Technologies 1st Edition Inam Ullah Khan - PDF
Download (2025)
https://ebookultra.com/download/cyber-security-for-next-
generation-computing-technologies-1st-edition-inam-ullah-khan/
Visit ebookultra.com today to download the complete set of
ebooks or textbooks
We have selected some products that you may be interested in
Click the link to download now or visit ebookultra.com
for more options!.
Check Point Next Generation Security Administration 1st
Edition Syngress
https://ebookultra.com/download/check-point-next-generation-security-
administration-1st-edition-syngress/
Next Generation IPTV Services and Technologies 1st Edition
Gerard O'Driscoll
https://ebookultra.com/download/next-generation-iptv-services-and-
technologies-1st-edition-gerard-odriscoll/
E Infrastructures and Technologies for Lifelong Learning
Next Generation Environments 1st Edition George Magoulas
https://ebookultra.com/download/e-infrastructures-and-technologies-
for-lifelong-learning-next-generation-environments-1st-edition-george-
magoulas/
Security Management of Next Generation Telecommunications
Networks and Services 1st Edition Stuart Jacobs(Auth.)
https://ebookultra.com/download/security-management-of-next-
generation-telecommunications-networks-and-services-1st-edition-
stuart-jacobsauth/
Next Generation SOA A Real World Guide to Modern Service
Oriented Computing 1st Edition Thomas Erl
https://ebookultra.com/download/next-generation-soa-a-real-world-
guide-to-modern-service-oriented-computing-1st-edition-thomas-erl/
Digital Security Cyber Terror and Cyber Security The
Digital World 1st Edition Ananda Mitra
https://ebookultra.com/download/digital-security-cyber-terror-and-
cyber-security-the-digital-world-1st-edition-ananda-mitra/
Cyber Security and Network Security 1st Edition Sabyasachi
Pramanik
https://ebookultra.com/download/cyber-security-and-network-
security-1st-edition-sabyasachi-pramanik/
Computational Methods for Next Generation Sequencing Data
Analysis 1st Edition Ion Mandoiu
https://ebookultra.com/download/computational-methods-for-next-
generation-sequencing-data-analysis-1st-edition-ion-mandoiu/
Cyber Security 1st Edition Jocelyn O. Padallan
https://ebookultra.com/download/cyber-security-1st-edition-jocelyn-o-
padallan/
Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan
Cyber Security for next generation Computing
Technologies 1st Edition Inam Ullah Khan Digital Instant
Download
Author(s): InamUllah Khan, Abou el Houba,Maria Ouaissa
ISBN(s): 9781003404361, 1003404367
Edition: 1
File Details: PDF, 8.96 MB
Year: 2024
Language: english
Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan
Cyber Security for
Next-Generation
Computing Technologies
This book sheds light on the cyber security challenges associated with next-
generation computing technologies, emphasizing the serious threats posed to
individuals, businesses, and nations. With everything becoming increasingly
interconnected via the Internet, data security becomes paramount. As technology
advances, people need to secure their data communication processes. Personal data
security, including data integrity and confidentiality, is particularly vulnerable.
Therefore, the concept of cyber security forensics emerges to ensure data security for
everyone, addressing issues such as data control, hijacking, and threats to personal
devices such as mobile phones, laptops, and other smart technologies. This book
covers key topics related to cyber security in next-generation computing technologies,
ultimately enhancing the quality of life for citizens, facilitating interaction with smart
governments, and promoting secure communication processes.
KEY FEATURES
• Highlights innovative principles and practices using next generation
computing technologies based cybersecurity.
• Presents an introduction to recent trends regarding the convergence of
AI/ML in cybersecurity
• Offers an overview of theoretical, practical, simulation concepts of
cybersecurity
Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan
Cyber Security for
Next-Generation
Computing Technologies
Edited by Inam Ullah Khan, Mariya Ouaissa,
Mariyam Ouaissa, Zakaria Abou El Houda,
and Muhammad Fazal Ijaz
Boca Raton London New York
CRC Press is an imprint of the
Taylor & Francis Group, an informa business
Designed cover image: Shutterstock
First edition published 2024
by CRC Press
2385 NW Executive Center Drive, Suite 320, Boca Raton FL 33431
and by CRC Press
4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
CRC Press is an imprint of Taylor & Francis Group, LLC
© 2024 selection and editorial matter, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa,
Zakaria Abou El Houda and Muhammad Fazal Ijaz; individual chapters, the contributors
Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of
their use. The authors and publishers have attempted to trace the copyright holders of all material
reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and
let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.
copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive,
Danvers, MA 01923, 978–750–8400. For works that are not available on CCC please contact
mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are
used only for identification and explanation without intent to infringe.
ISBN: 978-1-032-51899-2 (hbk)
ISBN: 978-1-032-51900-5 (pbk)
ISBN: 978-1-003-40436-1 (ebk)
DOI: 10.1201/9781003404361
Typeset in Times
by Apex CoVantage, LLC
v
Contents
Preface......................................................................................................................vii
About the Editors......................................................................................................ix
List of Contributors................................................................................................ xiii
Chapter 1 Cyber Security: Future Trends and Solutions ......................................1
Syed Immamul Ansarullah, Mudasir Manzoor Kirmani,
Ziema Mushtaq, and Gowhar Mohi ud din Dar
Chapter 2 Security and Intelligent Management: Survey................................... 16
Zaigham Abbas, Abdul Qahar Shahzad, Muhammad
Yaseen Ayub, and Muhammad Allah Rakha
Chapter 3 Comparative Analysis of Machine and Deep Learning
for Cyber Security..............................................................................39
Hafsa Maryam, Syeda Zillay Nain Zukhraf,
and Rehmat Ullah
Chapter 4 AI-Based Secure Wireless Communication Technologies and
Cyber Threats for IoT Networks ........................................................70
Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan,
and Salma El Hajjami
Chapter 5 Cyber Threat Actors Review: Examining the Tactics
and Motivations of Adversaries in the Cyber Landscape ..................84
Zakaria Abou El Houda
Chapter 6 Layer-Based Security Threats in IoT Networks...............................102
Muna Muhammad, Ahthasham Sajid, and Hira Arshad
Chapter 7 Intrusion Detection System Using AI and
Machine Learning Algorithm..........................................................120
Muhammad Tehmasib Ali Tashfeen
Chapter 8 Signature-Based Intrusion Detection System for IoT....................... 141
Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan,
and Muhammad Fayaz
vi Contents
Chapter 9 Hybrid Model for IoT-Enabled Intelligent Towns Using the
MQTT-IoT-IDS2020 Dataset............................................................ 159
Zupash, Muhammad Allah Rakha, Inam Ullah Khan,
Mariya Ouaissa, Mariyam Ouaissa, and
Muhammad Yaseen Ayub
Chapter 10 Cyber Security for Edge/Fog Computing Applications................... 177
Hanane Lamaazi
Chapter 11 Cyber Attacks Against Intelligent Transportation Systems.............190
Muhammad Usama, Ubaid Ullah, and Ahthasham Sajid
Chapter 12 Intelligent Transportation Systems for IoT-Based
UAV Networks.................................................................................. 231
Mamoona Jamil, Usman Haider, Inam Ullah Khan,
and Tarandeep Kaur Bhatia
Chapter 13 Cyber Attack Detection Analysis Using Machine Learning
for IoT-Based UAV Network ............................................................253
Usman Haider, Hina Shoukat, Muhammad Yaseen Ayub,
Muhammad Tehmasib Ali Tashfeen, Tarandeep Kaur Bhatia,
and Inam Ullah Khan
Chapter 14 Blockchain Solutions for Cyber Criminals ......................................265
Vijendra Kumar Maurya, Denis Jangeed, Latif Khan,
and Bhupendra Kumar Soni
Chapter 15 Blockchain Security Measures to Combat Cyber Crime ................. 275
Rahmeh Ibrahim and Qasem Abu Al-Haija
Chapter 16 AI Classification Algorithms for Human Activities
Recognition System With a Cyber Security Perspective .................294
Fahad Naveed, Shahbaz Ali Imran, Aftab Alam Janisar,
Aliyu Yusuf, Salman Khan, and Inam Ullah Khan
vii
Preface
The field of cyber security has recently gained significant importance as the chal-
lenge of securing information transmission becomes crucial. The advent of smart
IT infrastructure has revolutionized the global landscape, but it has also brought
forth security concerns. Consequently, cyber crimes have witnessed a steady rise
over time, involving activities such as identity theft, bullying, terrorism, and network
disruptions. In this smart world, privacy and security have become indispensable for
individuals. Fortunately, the next generation of computing technologies, including
IoT/IoE, artificial intelligence, machine learning, deep learning, smart grid, ad hoc
networks, SDN, network security, big data, image processing, and green communi-
cation, offers potential solutions.
The integration of these fields encompasses cyber attacks, forensic analysis, and
privacy issues, necessitating exploration through optimization techniques and evolu-
tionary computations. Next-generation computing finds diverse applications in areas
like smart infrastructure, air quality monitoring, waste management, school man-
agement, healthcare, and telemedicine. These applications rely on security measures
to facilitate optimal decision making in real time. Ad hoc networks play a crucial
role in reducing end-to-end delays and connectivity problems, while wireless com-
munication technology serves as the backbone of future networks. Governments,
enterprises, and individuals must prioritize cyber security and utilize forensic tech-
niques to protect data when sharing it with others, as privacy concerns arise due
to potential security breaches during extensive data sharing. Analyzing complex
information and real-time data is essential for ensuring the sustainability of future
networks and related applications.
This book sheds light on the cyber security challenges associated with next-
generation computing technologies, emphasizing the serious threats posed to individ-
uals, businesses, and nations. With everything becoming increasingly interconnected
via the Internet, data security becomes paramount. As technology advances, people
need to secure their data communication processes. Personal data security, including
data integrity and confidentiality, is particularly vulnerable. Therefore, the concept
of cyber security forensics emerges to ensure data security for everyone, addressing
issues such as data control, hijacking, and threats to personal devices such as mobile
phones, laptops, and other smart technologies. This book covers key topics related
to cyber security in next-generation computing technologies, ultimately enhancing
the quality of life for citizens, facilitating interaction with smart governments, and
promoting secure communication processes.
Chapter 1 provides an overview of cyber security, exploring its impact on busi-
nesses and analyzing recent trends and future solutions. Chapter 2 focuses on
security and intelligent management to ensure system safety. Chapter 3 presents a
comprehensive study of machine learning (ML) and deep learning (DL) techniques
for detecting potential cyber attacks, while Chapter 4 surveys AI-based applications,
intrusion detection systems (IDS), cyber attacks on IoT networks, and AI tools.
viii Preface
Chapter 5 aims to investigate the tactics and motivations of cyber threat actors in
the current cyber security landscape, while Chapter 6 conducts a detailed review of
security threats and attacks across different layers of IoT systems. Chapter 7 demon-
strates how an intrusion detection system using AI and ML can function effectively
out of the box, and Chapter 8 provides a detailed survey on signature-based IDS for
IoT environments. In Chapter 9, a hybrid model is proposed for identifying attacks
on IoT-enabled smart cities.
Chapter 10 offers an overview of cyber security in edge/fog computing applica-
tions, highlighting potential risks, common attack vectors, and best practices for
security. Chapter 11 explores various cyber security attacks targeting intelligent
transportation systems (ITS), including phishing attacks, malware, remote access,
denial of service (DoS) attacks, physical attacks, insider threats, and social engi-
neering. Chapter 12 presents a comprehensive survey of security attacks in UAV
networks and other intelligent transportation systems, while Chapter 13 conducts a
comparative study of machine learning techniques to investigate trust in IoT-based
aerial ad hoc networks.
Chapter 14 delves into the applications of blockchain technology in cyber security
and the security solutions it offers, while Chapter 15 expands on blockchain con-
cepts, components, architecture, features, types, and limitations. Lastly, Chapter 16
focuses on human activity recognition problems from a cyber security perspective,
proposing a novel method for accurate human activity recognition through different
algorithms.
ix
About the Editors
Dr. Inam Ullah Khan is a visiting researcher at King’s College London, UK. Dr. Khan
was a lecturer at different universities in Pakistan, including the Center for Emerging
SciencesEngineering&Technology(CESET),Islamabad,AbdulWaliKhanUniversity,
Garden and Timergara Campus, and University of Swat. He did his PhD in Electronics
Engineering from the Department of Electronic Engineering, Isra University, Islamabad
Campus, School of Engineering & Applied Sciences (SEAS). He completed his MS
degree in Electronic Engineering at the Department of Electronic Engineering, Isra
University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He
obtained his undergraduate degree in Bachelor of Computer Science from Abdul Wali
Khan University Mardan, Pakistan. In addition, his master’s thesis was published as a
book, Route Optimization with Ant Colony Optimization (ACO) (Lambert Academic
Publishing, 2017), in Germany, which is available on Amazon. He is a research scholar
and has published research papers at the international level. More interestingly, he
recently introduced a novel on routing protocol E-ANTHOCNET in the area of flying
ad hoc networks. His research interests include network system security, intrusion detec-
tion, intrusion prevention, cryptography, optimization techniques, WSN, IoT, UAVs,
mobile ad hoc networks (MANETS), flying ad hoc networks, and machine learning.
He has served at international conferences as a technical program committee mem-
ber, which include the EAI International Conference on Future Intelligent Vehicular
Technologies, Islamabad, Pakistan, and the 2nd International Conference on Future
Networks and Distributed Systems, Amman, Jordan, June 26–27, 2018, and has been
recently working on the same level at the International Workshop on Computational
Intelligence and Cybersecurity in Emergent Networks (CICEN’21) that will be held
in conjunction with the 12th International Conference on Ambient Systems, Networks
and Technologies (EUSPN 2021), which was co-organized in November 1–4, 2021,
in Leuven, Belgium. He has published more than 20 research papers (including book
chapters, peer-reviewed journal articles, and peer-reviewed conference manuscripts)
and three edited books.
Dr. Mariya Ouaissa is currently a Professor in Cybersecurity and Networks at Cadi
Ayyad University and a practitioner with industry and academic experience. She
obtained a PhD in 2019 in Computer Science and Networks, at the Laboratory of
Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail
University, Meknes, Morocco. She is a Networks and Telecoms Engineer, hav-
ing graduated in 2013 from the National School of Applied Sciences, Khouribga,
Morocco. She is a co-founder and IT consultant at the IT Support and Consulting
Center. She worked for the School of Technology of Meknes Morocco as Visiting
Professor from 2013 to 2021. She is a member of the International Association of
Engineers and International Association of Online Engineering, and since 2021, she is
an ACM Professional Member. She is Expert Reviewer with the Academic Exchange
Information Centre (AEIC) and Brand Ambassador with Bentham Science. She has
served and continues to serve on technical program and organizer committees of
x About the Editors
several conferences and events and has organized many symposiums/workshops/
conferences as a general chair and as a reviewer of numerous international jour-
nals. Dr. Ouaissa has made contributions in the fields of information security and
privacy, Internet of Things security, and wireless and constrained networks secu-
rity. Her main research topics are IoT, M2M, D2D, WSN, cellular networks, and
vehicular networks. She has published over 40 papers (book chapters, international
journals, and conferences/workshops), ten edited books, and eight special issues as
guest editor.
Dr. Mariyam Ouaissa is currently Assistant Professor of Networks and Systems at
Chouaib Doukkali University. She received her PhD degree in 2019 from the National
Graduate School of Arts and Crafts, Meknes, Morocco, and her Engineering Degree
in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She
is a communication and networking researcher and practitioner with industry and
academic experience. Dr. Ouaissa’s research is multidisciplinary and focused on the
Internet of Things, M2M, WSN, vehicular communications and cellular networks,
security networks, congestion overload problems, and resource allocation manage-
ment and access control. She is serving as a reviewer for international journals and
conferences, including IEEE access, wireless communications, and mobile com-
puting. Since 2020, she is a member of the International Association of Engineers
IAENG and International Association of Online Engineering, and since 2021, she
is an ACM Professional Member. She has published more than 30 research papers
(this includes book chapters, peer-reviewed journal articles, and peer-reviewed con-
ference manuscripts), ten edited books, and six special issue as guest editor. She has
served on program committees and organizing committees of several conferences
and events and has organized many symposiums/workshops/conferences as a gen-
eral chair.
Dr. Zakaria Abou El Houda is a researcher at the Université de Montréal,
Montréal, Canada. He received an MSc degree in Computer Networks from Paul
Sabatier University, Toulouse, France, his PhD degree in Computer Science from the
University of Montréal, Canada, and PhD degree in Computer Engineering from the
University of Technology of Troyes, Troyes, France. He has made contributions in
the fields of information security, intrusion detection/prevention system, and security
in software-defined networks. His current research interests include ML/DL-based
intrusion detection, federated learning, and blockchain. He has also served and con-
tinues to serve on technical program committees and as a reviewer of several inter-
national conferences and journals, including IEEE ICC, IEEE Globecom, and IEEE
Transactions.
Dr. Muhammad Fazal Ijaz received his BEng degree in Industrial Engineering
and Management from University of the Punjab, Lahore, Pakistan, in 2011, and his
DrEng degree in Industrial and Systems Engineering from Dongguk University,
Seoul, South Korea, in 2019. From 2019 to 2020, he worked as Assistant Professor in
the Department of Industrial and Systems Engineering, Dongguk University, Seoul,
South Korea. Currently, he is working as Assistant Professor in the Department of
xi
About the Editors
Intelligent Mechatronics Engineering, Sejong University, Seoul, Korea. He has pub-
lished numerous research articles in several international peer-reviewed journals,
including Scientific Reports, IEEE Transactions on Industrial Informatics, IEEE
Access, Sensors, Journal of Food Engineering, Applied Sciences, and Sustainability.
His research interests include machine learning, blockchain, healthcare engineering,
the Internet of Things, big data, and data mining.
Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan
xiii
Contributors
Zaigham Abbas
International Islamic University
Islambad, Pakistan
Qasem Abu Al-Haija
Princess Sumaya University for
Technology
Jordan
Syed Immamul Ansarullah
Government Degree College Sumbal
Srinagar, India
Hira Arshad Baluchistan
University of Information Technology
Engineering and Management Sciences
Quetta, Baluchistan, Pakistan
Muhammad Yaseen
Ayub COMSATS University
Attock Campus, Pakistan
Tarandeep Kaur Bhatia
University of Petroleum and Energy
Studies (UPES)
Bidholi, India
Gowhar Mohi ud din Dar
Lovely Professional University
Phagwara, India
Salma El Hajjami
Ibnou Zohr University Agadir
Morocco
Zakaria Abou El Houda
L@bISEN, ISEN Yncréa Ouest
Carquefou, France
Muhammad Fayaz
University of Central Asia Naryn
Kyrgyzstan
Usman Haider
National University of Computer and
Emerging Sciences
Islamabad, Pakistan
Rahmeh Ibrahim
Princess Sumaya University for
Technology
Jordan
Shahbaz Ali
Imran Birmingham City University
Birmingham, UK
Mamoona Jamil
Isra University Islamabad
Pakistan
Denis Jangeed
Geetanjali Institute of Technical Studies
Udaipur, India
Aftab Alam Janisar
Universiti Teknologi Petronas
Seri Iskandar, Perak, Malaysia
Inam Ullah Khan
Isra University Islamabad Campus
Pakistan
Latif Khan
Geetanjali Institute of Technical
Studies
Udaipur, India
Salman Khan
Abdul Wali Khan University Mardan
Pakistan
Mudasir Manzoor Kirmani
FoFy, SKAUST-Kashmir
India
xiv Contributors
Hanane Lamaazi
College of Information Technology
UAE University, Abu Dhabi,
United Arab Emirates
Hafsa Maryam
University of Cyprus
Nicosia, Cyprus
Vijendra Kumar Maurya
Geetanjali Institute of Technical Studies
Udaipur, India
Muna Muhammad
Baluchistan University of Information
Technology Engineering and
Management Sciences
Quetta, Baluchistan, Pakistan
Ziema Mushtaq
Cluster University Srinagar
India
Fahad Naveed
Federal Urdu University of Arts Science
& Technology
Islamabad, Pakistan
Bakhtawar Nawaal
University of Engineering and
Technology
Taxila, Pakistan
Mariya Ouaissa
Cadi Ayyad University
Marrakech, Morocco
Mariyam Ouaissa
Chouaib Doukkali University
El Jadida, Morocco
Muhammad Allah Rakha
FAST National University
Peshawar, Pakistan
Ahthasham Sajid
Baluchistan University of Information
Technology Engineering and
Management Sciences
Quetta, Baluchistan, Pakistan
Abdul Qahar Shahzad
Quaid-I-Azam University
Islamabad, Pakistan
Hina Shoukat
COMSATS University Islamabad
Attock, Pakistan
Bhupendra Kumar Soni
Geetanjali Institute of Technical
Studies
Udaipur, India
Muhammad Tehmasib Ali Tashfeen
Wichita State University
Wichita, Kansas, United States
Rehmat Ullah
Cardiff Metropolitan University
Cardiff, UK
Ubaid Ullah
University of Wah
Wah Cantt, Pakistan
Muhammad Usama
University of Wah
Wah Cantt, Pakistan
Aliyu Yusuf
Universiti Teknologi Petronas
Seri Iskandar, Perak, Malaysia
Syeda Zillay Nain Zukhraf
University of Cyprus,
Nicosia, Cyprus
Department of Electrical Engineering
National University of Computer and
Emerging Sciences
Peshawar, Pakistan
Zupash
COMSATS University Islamabad
Attock, Pakistan
1
DOI: 10.1201/9781003404361-1
Cyber Security
1 Future Trends and Solutions
Syed Immamul Ansarullah, Mudasir Manzoor
Kirmani, Ziema Mushtaq, and Gowhar Mohi
ud din Dar
1.1 INTRODUCTION
Before the beginning of 1970, viruses, Trojan horses, worms, spyware, and malware
were not even part of the mainstream lexicon of information technology. Robert
Thomas, a BBN Technologies researcher in Cambridge, Massachusetts, created the
first computer “worm” and named that “Creeper” [1]. By jumping between systems,
the Creeper disseminated infection; to combat this virus, Ray Tomlinson created
the Reaper, the first antivirus application that would seek out and destroy Creeper
[2]. In 1988, Robert Morris desired to determine the magnitude of the Internet and
to accomplish this, he developed software that accessed UNIX terminals, traversed
networks, and cloned itself. The Morris worm was so destructive that it rendered
computers unusable by substantially reducing their speed [3]. From that moment on,
viruses became more lethal, pervasive, and difficult to manage. With it came the
advent of cyber security.
The collective set of technology, methods, and procedures that businesses utilize
to safeguard their computing environments from harm and unauthorized data access
caused by online criminals or nefarious insiders is known as cyber security [4].
Organizations typically have a structure and system in place for dealing with attempted
or successful cyber attacks. An effective framework can aid in threat detection and
identification, network and system protection, and recovery in the event that an attack
is successful. Cybersecurity is included in all systems that are vulnerable to threats
and attacks to stop things like identity theft, cyber stalking, data loss, loss of sensitive
data, and extortion attempts [5]. Sensitive information about themselves as well as their
clients is held by critical infrastructures, including hospitals, financial services firms,
power plants, etc. To operate without interruption, cyber threat researchers find new
vulnerabilities, improve open-source tools, and inform people about the significance
of cyber security. Since the introduction of the first mainframes, the CIA (confiden-
tiality, integrity, and availability) triangle has been the de facto industry standard for
computer security [6]. Figure 1.1 shows the CIA triad in cybersecurity.
• Confidentiality: Maintaining confidentiality requires not divulging infor-
mation to unauthorized parties. It involves making an effort to safeguard
the privacy and anonymity of authorized parties engaged in data sharing
2 Cyber Security for Next-Generation Computing Technologies
and storage. Decrypting data that has been inadequately encrypted, man-
in-the-middle (MITM) attacks, and disclosing sensitive information fre-
quently compromise secrecy. Data encryption, two-factor authentication,
biometric verification, security tokens, and other standard procedures are
utilized to protect confidentiality.
• Integrity: Integrity relates to preventing unauthorized parties from
altering information. It is required that information and programs can
only be modified in certain and authorized ways. Integrity risks include
turning a computer into a “zombie computer” and infecting online pages
with malware. Typically, the following methods are used to ensure data
integrity: cryptographic checksums, uninterrupted power supplies, data
backups, etc.
• Availability: Availability ensures that the information is accessible to
authorized users when required. Data is only helpful if it is accessible to the
right people at the right time. Information inaccessibility may result from
security vulnerabilities such as DDoS attacks, hardware failure, poor soft-
ware, or human error. Common practices for ensuring availability include
backing up data to external drives, installing firewalls, having a backup
power supply, and replicating data.
FIGURE 1.1 CIA (confidentiality, integrity, and availability) triad in cyber security.
3
Cyber Security
1.2 TYPES OF CYBER SECURITY
Cyber security can broadly be divided into seven pillars [7–9]:
1. Network Security: A planned set of guidelines and configurations is used
to secure networks and data by ensuring their confidentiality, integrity, and
accessibility. By safeguarding the infrastructure, network security aims to
defend internal networks from intruders. The majority of attacks take place
across networks, and network security solutions are made to spot and stop
these attacks. These solutions incorporate data and access controls, includ-
ing next-generation firewall (NGFW) application restrictions, network
access control (NAC), data loss prevention (DLP), identity access manage-
ment (IAM), and NAC (identity access management), to enact safe online
use regulations. Technologies for advanced and multilayered network threat
prevention include NGAV (next-gen antivirus), sandboxing, and CDR (con-
tent disarm and reconstruction). Additionally significant are automated
SOAR (security orchestration and response) solutions, threat hunting, and
network analytics [10].
2. Cloud Security: Technology, services, controls, and policies that safe-
guard cloud data, infrastructure, and applications against online threats and
attacks are referred to as cloud security [11]. Although a lot of cloud service
providers offer security solutions, these are sometimes insufficient for pro-
viding enterprise-grade security in the cloud. Amazon AWS and Microsoft
Azure are two examples of public cloud computing, while VMmare or
OpenStack are examples of private clouds. The multi-cloud aspect of cloud
security presents several unique issues, including visibility, compliance,
and cost control. Enabling MFA on all accounts, enabling security logs,
encrypting your data, and double-checking your compliance needs are the
standard procedures to take into account for cloud security.
3. Mobile Security: Mobile security, also referred to as wireless security, is
the safeguard put in place to protect mobile devices like laptops, tablets,
and smartphones, as well as the networks to which they are linked, from the
dangers and risks associated with wireless computing [12]. Mobile devices
like tablets and smartphones, which are frequently disregarded, have access
to company data, putting firms at risk from phishing, malicious software,
and IM (instant messaging) assaults. These attacks are stopped by mobile
security, which also protects operating systems and devices from rooting.
This enables businesses to guarantee that only compliant mobile devices
have access to company assets when combined with an MDM (mobile
device management) solution.
4. Endpoint Security: Companies must protect end user devices like desk-
tops/laptops and servers, mobile devices, network devices (routers, switches,
and access points) with endpoint detection and response (EDR) solutions,
advanced threat prevention (such as anti-phishing and anti-ransomware),
and data and network security controls [13].
4 Cyber Security for Next-Generation Computing Technologies
5. IoT Security: Although deploying Internet of Things (IoT) devices undoubt-
edly increases productivity, it also exposes businesses to new online threats.
Threat actors look for weak devices that are unintentionally connected to
the Internet in order to utilize them for illicit purposes like gaining access
to corporate networks. With the help of auto-segmentation to manage net-
work activity, discovery and classification of connected devices, and the use
of IPS as a virtual patch to thwart attacks on susceptible IoT devices, IoT
security safeguards these gadgets [14]. To guard against exploits and run-
time attacks, the firmware of the device may in some situations be supple-
mented with tiny agents.
6. Application Security: Addressing vulnerabilities originating from unsafe
development procedures when creating, coding, and releasing software or
a website is known as application security. It is crucial to integrate security
standards, procedures, methods, and tools to safeguard applications dur-
ing all phases of development because applications are directly accessible
across networks. Cross-site scripting (XSS), DDoS attacks, lax access con-
trols, a lack of encryption, etc. are problems with application security [15].
Risk assessment, patching, secure development, web application firewalls,
encryption software, and application security testing are some of the proce-
dures and solutions to take into consideration for this kind of cyber security.
7. Zero Trust: Zero trust security, which takes a more granular approach
to security by securing specific resources through a mix of micro-
segmentation, monitoring, and the implementation of role-based access
controls, means that, by default, no one is trusted from inside or outside the
network [16]. Continuous monitoring and validation, least privilege, device
access control, micro-segmentation, preventing lateral movement, and mul-
tifactor authentication are the core tenets of zero trust.
1.3 CYBER SECURITY THREATS
The main types of cyber security threats that companies face today are discussed
next.
1.3.1 MALWARE
Malware is malicious software designed to perform a range of unwanted tasks on a
compromised machine [17]. Some of the most common kinds of malicious software are:
• Ransomware: Files on a device infected with ransomware are encrypted
using a key known only to the attacker. The creator of the ransomware
then asks money in exchange for the decryption key [18]. Ransomware has
become one of the most widespread and expensive cyber dangers that busi-
nesses face in recent years.
• Trojan Horse: Trojan horses are a type of malicious software that can trick
users into downloading it by seeming to be a legitimate, free version of a
5
Cyber Security
paid program. After a victim downloads and runs the Trojan, it will begin
performing malicious actions on the infected machine [19].
• Remote Access Trojan (RAT): Trojans designed to serve as a backdoor
for additional attacks are known as remote access Trojans (RATs). Once
the virus is active on an infected machine, the attacker gains access to the
system remotely and can then steal data, install further malware, or execute
other malicious activities [20].
• Spyware: Spyware is a form of malware that monitors a user’s activity on
their computer and records that data. Hackers create spyware to gain access
to private information that may be sold or used in future assaults [21]. This
information can include login credentials, financial data, and other sensitive
details.
• Cryptojacking: In order to add new blocks to the blockchain, Proof of
Work (PoW) cryptocurrencies require a computationally intensive process
called mining. In order to mine cryptocurrency, cryptojacking malware
installs itself on a compromised computer and uses its processing power to
create blocks [22].
1.3.2 SOCIAL ENGINEERING ATTACKS
Social engineering attacks involve deception, compulsion, and other forms of psy-
chological manipulation to persuade the target to perform the desired action. Typical
instances of social engineering techniques are as follows:
• Phishing: Phishing is one form of social engineering in which the target is
tricked into providing information or doing some other action that benefits
the attacker [23]. The goal of phishing is to trick users (using emails, social
media posts, and other kinds of electronic communication) into visiting a
harmful website, downloading a malicious file, or providing personal infor-
mation such as passwords.
• Spear Phishing: Spear phishing assaults are a type of phishing in which
the attacker tries to trick a specific person or group into giving over sensitive
information by posing as a trustworthy organization [24]. A spear phishing
email sent to the accounts payable clerk can, for instance, falsely claim to
be from one of the company’s legitimate vendors or suppliers, demanding
payment for goods or services already rendered.
• Smishing: What we call “smishing” attacks originate from “phishing,”
except they use text messages instead of email [25]. These attacks take
advantage of smartphone features, such as the ability to hover the mouse
over an SMS link to see where it leads and the prevalence of link shortening
services (like bit.ly).
• Vishing (Voice-Based Phishing): Vishing uses similar techniques to
phishing but takes place over the phone. Convincing a victim to do a mali-
cious action or reveal private information like passwords or credit card
numbers is an attack technique [26].
Other documents randomly have
different content
37.—​
Paddock’s left again stopped, and Jones returned on
the side of the wig-block. Paddock then popped in his left with
effect on the mouth, and after some more exchanges Paddock
got down. He looked round anxiously at Jones, as he was
being carried to his corner, and evidently wished his work was
done.
38.—​
Paddock made his right heavily on Jones’s body, and
then his left on the side of his head. Both now pegged away
with determination, and in a most unflinching way, as if they
had received fresh vigour. The hitting, however, was in favour
of Paddock, and in the end Jones fell weak. It had evidently
been an expiring effort on his part to get a decided lead, and
having failed it was now patent to all that his defeat was a
mere question of time.
39.—​
Paddock let go his left on the side of Aaron’s cheek,
which led to some severe counter-hits. They then closed, and
Paddock pegged away with his right at the ribs until both
were down.
40.—​
Some slight exchanges, without mischief, and Jones
down.
41.—​
Paddock came up with an awful grin; his single open
peeper glaring in a most ludicrous manner. He tried to lead
off, but napped it on the smeller and left ear, from which the
main was again tuned on. Paddock then made his right on the
ribs, and Jones dropped.
42.—​
Paddock again effected a heavy right-handed delivery
on the ribs, and after slight exchanges both were down.
43.—​
Slight exchanges, in which neither was effective, and
in a scramble they fell. Paddock under.
44.—​
Jones attempted to lead off, but was easily stopped;
Paddock returning heavily on his left eye, and then on the
body, again screwed his courage to the sticking-place, and a
second with his right and got down.
45.—​
Paddock led off, but was short. In another attempt he
reached Aaron’s damaged bread-basket, and dropped à la
Bendigo. He jumped up to renew the fight, when Jones nailed
him on the left side of his brain-pan, and Tom finally dropped
to end this round.
46.—​
Jones tried to lead, but was very slow, and easily
stopped. Paddock again reached his ribs with his right, and a
sharpish rally ended in their failing together at the ropes.
47.—​
Paddock’s left was out of distance; he tried his right at
the body but missed, and Jones dashing in, caught him on the
right cheek slightly, and fell on his face.
48.—​
Counter-hits with the left, Paddock catching Jones
very heavily on the left temple, and dropping him as if shot.
49.—​
Jones, very slow to the call of time, at length came up
wildly. He staggered in to close, and they fell, Jones under.
50.—​
Jones, alter a futile attempt to punish, fell weak.
51.—​
Slight exchanges, but no mischief, and both down.
52.—​
Wild, swinging hits which did not get home. Paddock
then planted his right heavily on the ribs, and again got down,
amidst loud hisses. There was no appeal to the referee, and
the fight proceeded.
53.—​
Paddock let go his left on the mouth; slight exchanges
followed, and they then fell on their backs. Both were much
exhausted, but Paddock was the stronger on his pins.
54.—​
After slight exchanges, Paddock again made his right
at the ribs, and got down.
55.—​
Paddock led off, but was stopped. They then got
close, and some slight fibbing ended in Jones seeking Mother
Earth. Paddock stood looking at him, as much as to say, “Why
don’t you cut it?” until he was carried to his corner.
56.—​
Jones attempted to lead off, but Paddock countered
him heavily on the cheek, and he fell, amidst cries of “Take
him away.”
57.—​
Jones, although slow to time, came up steadily, and
succeeded in putting in a little one “on the place where Tom’s
eye ought to be,” and having received in return on the
proboscis, he fell on his latter end.
58.—​
Paddock rushed in to finish, but Jones, to the surprise
of all, stopped him, and some heavy counter-hits took place.
Paddock getting another crack on his disfigured nob, and
hitting Jones down by a spank on the dice-box.
59.—​
Paddock planted his left on Jones’s kissing-organ
heavily, opening a fresh tap, and Aaron again dropped. For
two more rounds did Jones stagger up to the scratch, but it
was only to receive—​
all the steel was out of him—​
he was
extremely weak on his legs, one eye was closed, and the
other following suit; his nose, mouth, and ribs were severely
damaged, while Paddock—​
although tremendously disfigured
about the title-page—​
had still a little “go” left in his trotters.
Every one begged of Jones or his seconds on his behalf to
give in, but the gallant fellow persevered against hope until
the close of the 61st round, when getting another heavy crack
on the mouth, he fell, almost senseless, and his seconds
threw up the sponge in token of defeat, at the end of one
hour and twenty-nine minutes. Poor Aaron, who had done all
he could do to turn the tide in his favour, was much mortified
by this second defeat at the hands of Paddock, and cried like
a child. He could scarcely walk on leaving the ring, and was
obliged to lie down on an adjacent bank for some time before
he could be removed to the station. Paddock was no great
shakes, and was evidently much delighted that his task was at
an end. He went into the ring with a full conviction that he
should not gain a bloodless victory, and that he should get his
brain-pan pretty well knocked about, but we question whether
even he, confident as he was, anticipated that it would be
quite so “hot” as it turned out.
Remarks.—​
Every one who witnessed the above battle will
cordially agree with us that it was a determined, manly
struggle for pre-eminence throughout. It clearly demonstrated
to our mind, however, the fact that Jones does not possess
sufficient physique to enable him to contend successfully
against such a hardy bit of stuff as Tom Paddock. True, he is a
harder hitter than Paddock, but then, after a time, unless a
man has a frame of iron, this gift is materially diminished by
the constant jar; and a determined adversary, with such a
granite nob as Tom Paddock, capable of receiving almost any
amount of punishment, is almost certain to last longest at
mere give-and-take fighting, as was fully proved on Tuesday.
Jones, notwithstanding he had received hints from the most
accomplished boxer of the day, Jem Ward, still persevered in
his old system of hitting principally with his right-hand, a
practice which, although it altered Paddock’s physiognomy in
the most extraordinary manner on one side, still was not
calculated, unattended as it was by much execution from his
left, to reduce his opponent to a state of darkness. He
punished Paddock more than that hero was ever punished
before, and we believe that, did he possess more wear and
tear, it would have been a much nearer thing than it was. He
had for some time the best of the hitting, but, falling weak,
the inequality was quickly removed by the determination of
Paddock, who, seeing that he had his work to do, never gave
Jones breathing time to collect his faculties.
The Old Tipton being matched with Aaron Jones,
and Harry Broome being supposed to have retired
from pugilism to publicanism, Tom was standing idle
in the market-place, when on the 2nd of December
he was enlivened by reading the following in the Ring
column of Bell, under the heading of “Who is to have
the Belt?” A new one having been just put into the
hands of a fashionable goldsmith from the proceeds
of a public subscription:
“Mr. Editor,—​
It was my intention never to have entered the
roped arena again, but the persuasions of my old friends and
backers have determined me to pull off my shirt once more. I
now come forward for the satisfaction of the public and the
Prize Ring, in order to determine who’s the better man, Tom
Paddock or myself. I will fight him for £200 a side for the
Champion’s Belt, which I feel I am entitled to, for both the
Tipton Slasher and Aaron Jones have been beaten by me or
by men that I have beaten, and therefore I claim it, and shall
do so until fairly beaten in a roped ring, as a trophy of that
description ought to be contested for man to man, and never
obtained upon a mere challenge. To prove that I mean to
carry out what I state, I will meet Paddock at your office on
Wednesday, Dec. 12, to sign articles, to which the following
condition must be attached:—​
The money not, under any
circumstances, to be parted with until fairly won or lost in a
24 feet roped ring. Should this not suit Paddock (not that I
wish to interfere with the match between the Tipton Slasher
and Aaron Jones) I will fight Aaron Jones for £200 a side,
whether he wins or loses with the Tipton Slasher. By inserting
this, you will oblige.—​
Yours, &c.,
“HENRY BROOME.”
“Bell’s Life” Tavern, Strand,
November 28, 1855.
Paddock lost no time in calling on the stakeholder,
and leaving £10 early in the next week, under
condition that if he could not raise £200, they should
meet for £100. Broome did not flinch, and, after two
more “conditional” deposits, articles were signed in
the editorial sanctum of Bell’s Life, by which Thomas
Paddock and Henry Broome mutually bound
themselves to fight for £200 a side, on Monday, May
19th, 1856, within 100 and over 50 miles from
London. The anxiety in boxing circles, as the day
drew near and all was found progressing smoothly to
the desired issue, became intense; and Alec Keene’s
“Three Tuns,” in Moor Street, whence Paddock was
backed, and Harry’s own house, the newly named
“Bell’s Life” Tavern (now the “Norfolk Arms”), in the
Strand, were crowded with curious inquirers as to
how the men went on, and for “the straight tip.” On
the day previous both champions showed, and the
distribution of colours—​
a blue with white spot for
Broome, and a blue with a white check for Paddock—​
on the usual terms of a guinea or “nothing,” was
extensive. Paddock was closely scrutinised by both
friends and foes, each equally anxious to ascertain
whether time or previous contests had impaired his
freshness or vigour; but no traces of deterioration
were there, and those who felt his muscle declared
their belief that he was never in finer trim.
Harry’s appearance, so far as his face was
concerned, was that of perfect health, and the
disappearance of the protuberance which had long
been visible under his waistcoat was remarkable.
These signs of careful training, with the prestige of
his name, carried the odds to 6 and 7 to 4 in his
favour. We knew that he worked hard and was most
creditably abstemious; but we feared, as the sequel
proved, that he was unable to train efficiently, and
that strength was lost in the great reduction of
weight to which he had been subjected.
It had been the original intention of the backers of
the men to have given the inhabitants of Kent and
Sussex the opportunity of a view of this encounter;
but it proved, upon inquiry, that it was impossible to
obtain a “special” on those lines, as some saints in
the directorate of the companies had issued an ukase
against such “excursions” as were not to their own
taste or under their own patronage. Recourse was,
therefore, had to the Eastern Counties, where the
necessary facilities for an excursion of “Odd Fellows”
was applied for and granted. It was suggested to the
“managers” of the “outing”—​
Alec Keene, Fred
Broome, and Dan Dismore—​
that any invasion of the
territory of Cambridge, Huntingdon, or the country
round Mildenhall or Brandon, would inevitably be
resisted; so these worthies, after consultation with
experienced strategists, deemed it prudent to
abandon the old and beaten track, and strike out a
new plan of campaign. The company’s agent was,
therefore, apprised that the excursionists wished to
pass through Suffolk into Norfolk, by the Eastern
Union Line, as their place of reunion would be a few
miles beyond Ipswich. The officials made their
arrangements accordingly, and on our arrival at the
Shoreditch terminus, at eight o’clock on Monday
morning, we found that no pains had been spared to
prevent anything like crushing or disorder at the
doors. The neighbourhood of the station was, as
usual, crowded with anxious spectators, who hoped
to get a view of the principals in the forthcoming
duel; but, so far as Broome was concerned, they
were disappointed, as he had proceeded at an early
hour to Stratford, where it was arranged the train
should stop and pick him up. Paddock, however,
accompanied by Jemmy Massey and Alec Keene, was
early at the starting-place, and was eagerly greeted
by the multitude. From the heavy tariff which had
been determined on, we fully expected to find the
company not only very select, but far from
numerous, and we anticipated that the original
number of carriages ordered would have been found
sufficient; but such was the rush of the public, that,
long before the hour of starting, every carriage was
filled, and chiefly by respectable persons. It was soon
perceptible that a considerable addition to the
conveyances was required, and no less than seven
extra carriages were added, all of which filled almost
immediately; and, not only so, but very shortly after
the special had started a sufficient number of
gentlemen arrived at the station to charter another
train of some four or five carriages, to follow that
containing the belligerents. Among the voyageurs by
the first train were almost all the pugilists of note,
and an immense number of Corinthians of every
grade. In fact, a larger muster of the higher classes
we have not seen on such an occasion for many
years. There were one or two familiar faces missing,
but there were quite sufficient new hands to make up
for the deficiency. Among the company was an
Indian prince of high rank, and his suite, anxious to
obtain a glimpse of the peculiarly national spectacle,
and we were delighted to hear that he was treated
throughout with the greatest respect, and suffered
not the slightest indignity from the thoughtless
throng on account of his peculiar appearance or
unaccustomed manners; a piece of good behaviour
on the part of an unpoliced crowd that was a
creditable example to those public gatherings which
pretend to superior order and civility. The only
complaint we heard on the way down was on the
subject of the commissariat, the want of “belly-
timber” being universally felt. It turned out that the
absence of refreshment among the Corinthians was
attributable to the pressure of a certain class at the
doors of the station, who, unwilling to pay, and
anxious to get a trip for nothing, besieged the doors
at the latest moment, in the hope of taking the
officials off their guard, and so making a rush for the
platform. The formidable appearance of this phalanx
induced the police of the line to close the doors and
refuse admission to all. Unluckily, amongst the late
arrivals, was Mr. Commissary Dismore, who, with his
Land Transport Corps, well provided with everything
necessary, arrived just too late. Dan himself contrived
to get round by a private way on to the platform,
but, alas! the “vital ammunition” was cut off. Thanks,
however, to the second special, the provisions were
brought down in time for the hungry and thirsty souls
to refresh themselves after the mill, when due justice
was done to Dan’s ample provision. The first special
did not leave Shoreditch until a quarter past nine; it
reached Stratford about half-past; and here Harry
Broome and his friends were picked up. Harry’s mug
looked hard and healthy, and about his mouth was a
smile of confidence. The universal exclamation was,
“How well he looks!” and the short glimpse obtained
of him induced many persons to “open” at offers of 7
to 4 on him—​
offers which the friends of Paddock
were not slow to accept. The train now sped on at a
good pace to Chelmsford, where water was taken in,
and we again set forward on our journey. At
Manningtree, where a second refresher was
necessary for the engine, an intimation was received
that the “war hawks” were abroad, and that the
Ipswich police had, through the indiscretion of some
would-be-clever persons, who had gone on over
night, obtained a scent of what was intended, and
had telegraphed to the police at Diss, in Norfolk, and
other places, to be on the look-out. This intimation
arrived most opportunely, and it was at once resolved
to put on the double, and to bring off the mill as
close as possible to Ipswich, where it was least
expected. The commander-in-chief mounted the
engine, and, under his direction, a likely spot was
selected, where the train was brought to a halt, and
the assembled multitude, to the number of at least
five hundred, dropped upon the field like a flight of
crows. Several of the committee of the P.B.A. at once
spread themselves about the field in skirmishing
order to select the best spot, but while they were so
engaged the Commissary and Callas had pitched
upon a place which, although not the best, was still
tolerably level, and the grass was not very long. Here
no time was lost in getting up the fixings. It was
uncertain how long the Ipswich “blues” would be
hoodwinked, and, therefore, time was everything. A
large outer-ring was formed simultaneously with the
original circle, and round this the non-paying part of
the community quickly ranged themselves. The
business of selling inner-ring tickets proceeded
briskly, and a sum of £47 was realised thereby, the
surplus of which, after paying ring-keepers and the
farmer on whose grounds the mill took place for
damage to his grass, went to the funds of the
Association. So great was the number of privilege
ticket-holders that, on sitting down at some distance
from the ring, they formed a double row almost the
whole way round, and effectually proved their own
barrier against the irruption of those who at all times
are more free than welcome. It is true that several of
the latter class, by some means, obtained access to
Broome’s corner later on, where their vociferations
were the reverse of agreeable; but, thanks to the
exertions of Mike Madden, Bill Barry, and Fred Mason,
they were effectually kept within bounds. At length,
by a quarter to one, everything was in apple-pie
order, and the signal being given, the men at once
stepped into the arena; Harry Broome attended by
Tass Parker and Tom Sayers, and Paddock under the
surveillance of the accomplished Alec Keene and
Jemmy Massey. They smiled and shook hands, Harry
shaking his nut in a significant manner at Tom, as
much as to say, “I’ve got you at last, old fellow.” The
colours were now tied to the post, and while the men
were preparing their toilet a good deal of betting
took place. The first offer was £35 to £20 on Broome
—​
a bet which was at once made and staked. 7 to 4
was then laid very freely, the business of booking and
staking going on most briskly. Massey now came
forward and offered to take £20 to £10, but not
being able to get a higher bid than £15 to £10, he
closed, and this amount was staked, as was also a
similar bet laid to Alec Keene. The layers now began
to hang back, and £30 to £20 became the current
odds, at which a good deal more business was done.
A heavier amount of betting we never remember to
have witnessed at the ring-side; and this tended,
more than anything else, to show the intense interest
the battle excited. At length, offers became more
languid, and finally ceased altogether; and as we did
not hear of a single bet after the mill commenced,
we are inclined to think that the speculators had
staked every farthing they brought with them. By one
o’clock it was announced that both men were quite
ready, and time being called they were led to the
scratch, where, after the usual hands across, they
were left, peeled to the buff, and their proportions
and condition displayed to the curious gaze of the
assembled throng.
Tom Paddock, as he stood at the scratch, looked
every inch a gladiator. Each thew and sinew was
perfectly developed, and seemed ready to burst the
tightened skin. His broad shoulders and deep chest,
covered with ponderous muscles, were the
admiration of all; and the distinctness with which his
lower ribs were visible proved that there was not an
ounce of superfluous flesh on his wiry, powerful
frame. His mug was hard and ruddy, and there was
clearly little there to swell up should his dial come in
too close propinquity to Harry’s sledge-hammers. He
looked good-humoured, but determined, and
evidently feeling the importance of the occasion, he
toed the scratch with a determination to “do or die.”
Widely different was the aspect presented by the
once powerful Harry Broome. True it was that he had
got rid of his superabundant belly, but in doing so it
was apparent to all that he had also got rid of much
of his muscle and sinew. When he fought Harry Orme
he was certainly well covered with fat, but still
underneath this coating the evidences of great power
were plainly visible; but now, what a falling off was
there! Barring the aforesaid protuberance, he was as
fat as ever, but all appearances of sinewy strength
had vanished. His breasts were soft and puffy, his
arms round and smooth, while the flesh on his once
fine back hung in collops; there was also a slight
eruption on his pale skin, which betokened a feverish
state of the blood, which would not have been
guessed from the appearance of his face. He said he
felt quite well, though not so strong as on former
occasions. On inquiring of Joe Bostock, who had
been with him while he finished his training at
Bosham, near Chichester, we learned that he had
several times complained of weakness, and that the
more he tried to get his fat off the more did it seem
to accumulate. Harry himself informed us, and we
are satisfied as to the truth of his statement, that he
reduced himself upwards of 3st. in the course of his
exercise, but he found himself getting so weak that
he was compelled at last to be more gentle in his
work; and he now declares his belief that had he
gone into the ring in his ordinary state, without any
preparation whatever, he would have been better and
stronger than he was on Monday. With all his
drawbacks, however, he was extremely confident as
to the result of the battle, and advised his friends to
back him at all hazards. He no doubt depended upon
his science, and expected to set at defiance the well-
known onslaughts of his opponent. We must now
bring these preliminaries to a conclusion, and
proceed to our account of
THE FIGHT.
Round 1.—​
Precisely at six minutes past one the onslaught
commenced. Broome, to the astonishment of all, did not
assume the elegant attitude we have seen in former battles,
but feinted and dodged about without gathering himself
together in the least. Tom was evidently surprised, and
thought he must be “kidding;” he therefore assumed a
defensive position, and bided his time. He had not long to
wait. Harry was bent on forcing an opening, and dashed in,
feinted with his left, ducked his head, and lodged his left
heavily on Tom’s breadbasket. His nut was laid open to a
severe upper cut, but Tom, bewildered, did not see, and
therefore did not take the advantage of his opening. Broome
now came again, let fly his left at the forehead, inflicting no
damage, napped a little one on the left brow, and slipped
down.
2.—​
Paddock at once rattled in, let go his left with great
quickness on the proboscis, drawing first blood. Broome
returned on the left cheek, and also elicited a supply of the
ruby. Harry then closed, and tried to throw his man, but, after
a short struggle, in which Tom was very busy with his right at
close quarters, Tom slipped from his grasp and fell.
3.—​
Broome, out of all form, tried to take a lead, but in
vain. Paddock was too quick for him, and pegged away
heavily left and right on the conk, inflicting a cut on the
bridge thereof, drawing more fluid. Broome again closed, and
Tom resorted to his fibbing system with both hands heavily on
the side of Harry’s nut, and on his ribs. This effectually put a
stop to any chance of his being thrown, and in the end both
fell side by side.
4.—​
Broome dashed in, let fly his left, which missed; slight
exchanges with the same hand followed, and Paddock slipped
down. He jumped up immediately to renew the round, but
Jemmy Massey squeezed him in his arms as if he were a child,
and carried him struggling to his corner.
5.—​
Broome came up puffing, and evidently out of sorts.
Paddock, fresh as a daisy, grinned a ghastly grin, and awaited
the onslaught. Harry tried his left, when Tom countered him
heavily on the snout, drawing more of the crimson. Tom
attempted to follow up his advantage, but Harry turned and
ran away, Tom after him. On Broome turning round, Tom
again planted a little one on the snuff box, and they once
more closed, and some infighting took place, in which Broome
received heavily on the body, and Tom got a little one behind
his left ear. In the end Paddock slipped down.
6.—​
Tom came up smiling. Broome at once rushed in, and
closed with his head under Paddock’s arm. Here Tom held it
and pegged away at the ribs until both were down, Broome
blowing and apparently distressed. The layers of odds even
thus early began to look excessively blue at the want of
precision of their pet, and his evident lack of lasting powers.
7.—​
Broome slow, tried a feint, when Tom nabbed him with
the left on the cheek, and then with the same hand on the
snout. Harry at once closed, when Tom, as usual, resorted to
his fibbing, at which game Harry joined issue, and each got it
on the nose and left cheek. In the end both again down.
8.—​
Tom led off with his left, a straight’un, on the snuff box.
Some rambling, scrambling exchanges followed to a close, in
which both fell.
9.—​
Tom steadied himself, and let go his left, but Harry
countered him heavily on the right cheek. Tom returned on
the jaw with his right, and in his hurry to get away slipped
down. Harry drew back his hand, as if intending to deliver a
spank, but prudently withheld the blow.
10.—​
Broome let go his left, but open-handed, on Tom’s left
peeper. Tom returned on the sneezer, increasing the supply of
the carmine, and slipped down.
11.—​
Tom feinted, but found Broome ready for a shoot, and
stepped back, Harry after him. Tom now let fly his left well on
the nose. Harry rushed in to close, and Tom resumed his
fibbing on the dial and ribs. In the end he slipped down to
avoid the fall.
12.—​
Tom tried his left, but Harry stepped back, and as Tom
followed, delivered a heavy right-hander on the mark, and
then his left heavily on the mouth, drawing the Falernian, but
fracturing one of the small bones of his hand. Paddock at
once got down, and Harry walked to his corner.
13.—​
Tom tried his left twice in succession, but Harry
jumped away, Tom, however, persevered, and having got
another little one on the mouth, went in to close, but on
Broome grasping him slipped down.
14.—​
Harry now tried it on, but Tom kept away, and as
Harry followed, gave him a touch on the ribs with his left, and
getting a little one in return on the chin, dropped.
15.—​
Paddock dashed in without precision, and after a
scrambling rally, in which there was more bustle than
damage, he got down.
16.—​
Tom once more steadied himself, and let go his left,
but Harry cross-countered him on the forehead. Tom now
crept close, and feinting with his left, drew Broome out, and
then knocked him off his pins by a slashing right-handed
cross-counter on the jaw. (First knock-down blow for
Paddock.) The cheers of those who had taken the odds were
now vociferous.
17.—​
Harry did not seem much the worse for the crack in
the last round, but came up good humouredly, and at once
dashed to a close. Some sharp infighting took place, followed
by a break away. Tom came again, and Harry nailed him very
heavily on the snout with his right, staggering him, and
drawing a plentiful supply of home-brewed. Paddock quickly
sought mother earth.
18.—​
Tom showed a slight mark on the left side of his beak,
which was also swollen and bleeding. He rushed in, when
Harry caught him on the left cheek, drawing more blood. Tom
returned the compliment with interest on the smeller, a very
heavy spank, which once more knocked the gallant Harry off
his perpendicular.
19.—​
Paddock feinted and let go his left on the nozzle, got a
little right-hander on the left cheek in return, and slipped
down, grinning. He jumped up, however, and said, “Have
another round, Harry.” Harry was ready, but Tom was once
more borne off by “the stunted Life Guardsman” (Massey).
20.—​
Tom rattled in again, caught Harry on the nose, just
between his eyes, removing more bark, and drawing more
claret. Broome returned on the left cheek, and a close
followed, in which both pegged away, until Tom fell on his
knees, bleeding from his scent-bottle. (Time 28 minutes.)
21.—​
Paddock let go his left once more at Harry’s proboscis,
and some rapid but wild exchanges followed, Harry hitting
open-handed, and Tom without judgment, and in the end Tom
slipped down.
22.—​
Harry came up panting and bleeding from the nose.
Tom feinted, and Harry turned away, but Tom, when he got
near enough, dashed out with his left very straight and heavy
on Harry’s mouth, inflicting a severe cut, and turning on the
tap. Harry missed his return, but tried to make a plant upon
Tom. It was a failure, however—​
he seemed to have no steam
in him—​
and Paddock once more dashed out his left on the
mug, increased the wound, and again floored his brave
antagonist.
23.—​
Harry, although distressed, attempted to take the lead
with his right, his left being apparently useless. He, however,
missed a terrific right-hander, and napped a hot one on the
nozzle in return. Harry then got in a little one on the jaw, and
Tom got down cunning.
24.—​
Paddock led off with his left slightly on the nose,
which led to exchanges, Tom again being at home on the
snuff box, renewing the stream. He got a right-hander on the
left listener, drawing the ruby, and fell.
25.—​
Harry’s mug, on coming up, was much altered for the
worse. His mouth was much swollen and cut, and his nasal
organ was in not much better condition, while a swelling was
perceptible under his left eye. Paddock had few marks of
punishment, and was as fresh as ever. Massey offered to lay
odds on him, but did not find a response. Paddock made a
feint, when Harry turned and ran round the ring, Tom after
him. Harry then turned round, and a close took place, in
which, after some slight fibbing, Paddock fell, receiving a
right-hander on the nut as he reached the ground. (A claim of
“foul,” which was not allowed.)
26.—​
Harry sparred a little for wind, and Tom let fly his left,
which was stopped. He then closed, and Tom, as usual,
pegged away with both hands right merrily, thus preventing
any chance of a heavy fall. His blows fell on Harry’s damaged
kisser and ribs. In the end Paddock slipped out of Harry’s
grasp and fell.
27.—​
The men feinted until they got close, when
tremendous right-handed counters were exchanged, Tom
getting home on the snout, and Harry on the left cheek, and
Paddock down.
28.—​
Tom came up wild, and rushed in, when Broome
countered him again heavily on the right peeper. Exchanges
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookultra.com

More Related Content

PDF
Cyber Security for next generation Computing Technologies 1st Edition Inam Ul...
PDF
Cyber Security For Nextgeneration Computing Technologies Inam Ullah Khan Mari...
PDF
Blockchain For Information Security And Privacy 1st Edition
PDF
Iot Security And Privacy Paradigm Internet Of Everything Ioe 1st Edition Souv...
PDF
Multimedia Watermarking Techniques And Applications 1st Edition Darko Kirovski
PDF
Digital Forensics In The Era Of Artificial Intelligence Nour Moustafa
PDF
Internet Of Everything And Big Data Major Challenges In Smart Cities Salahddi...
PDF
Blockchain Technology For Ioe Security And Privacy Perspectives 1st Edition A...
Cyber Security for next generation Computing Technologies 1st Edition Inam Ul...
Cyber Security For Nextgeneration Computing Technologies Inam Ullah Khan Mari...
Blockchain For Information Security And Privacy 1st Edition
Iot Security And Privacy Paradigm Internet Of Everything Ioe 1st Edition Souv...
Multimedia Watermarking Techniques And Applications 1st Edition Darko Kirovski
Digital Forensics In The Era Of Artificial Intelligence Nour Moustafa
Internet Of Everything And Big Data Major Challenges In Smart Cities Salahddi...
Blockchain Technology For Ioe Security And Privacy Perspectives 1st Edition A...

Similar to Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan (20)

PDF
Fixed Mobile Convergence Handbook Syed A Ahson Mohammad Ilyas
PDF
Intelligent Data Analytics Iot And Blockchain Bashir Alam Mansaf Alam
PDF
Digital Image Security Techniques And Applications Edited By Amit Kumar Singh...
PDF
Future Connected Technologies Growing Convergence And Security Implications M...
PDF
Botnets Architectures Countermeasures And Challenges First Edition Anagnostop...
PDF
Industrial communication technology handbook Second Edition Richard Zurawski
PDF
Information Security Handbook (Internet of Everything (IoE)) 1st Edition Vari...
PDF
Security Engineering For Embedded And Cyberphysical Systems Saad Motahhir
PDF
Ai Factory Theories Applications And Case Studies Ramin Karim
PDF
5G Wireless Communication System in Healthcare Informatics 1st Edition Manoj ...
PDF
Value Added Services for Next Generation Networks Informa Telecoms Media 1st ...
PDF
Cybersecurity for Industrial Control Systems SCADA DCS PLC HMI and SIS 1st Ed...
PDF
WiMAX Applications 1st Edition Syed A. Ahson
PDF
Explainable Artificial Intelligence For Intelligent Transportation Systems Am...
PDF
WiMAX Applications 1st Edition Syed A. Ahson
PDF
Handbook Of Smart Manufacturing Dr Ajay Kumar
PDF
Contextaware Pervasive Systems 1st Edition Seng Loke
PDF
WiMAX Applications 1st Edition Syed A. Ahson 2024 Scribd Download
PDF
Security in Distributed Grid Mobile and Pervasive Computing 1st Edition Yang ...
PDF
Bitcoin and blockchain: history and current applications Balas
Fixed Mobile Convergence Handbook Syed A Ahson Mohammad Ilyas
Intelligent Data Analytics Iot And Blockchain Bashir Alam Mansaf Alam
Digital Image Security Techniques And Applications Edited By Amit Kumar Singh...
Future Connected Technologies Growing Convergence And Security Implications M...
Botnets Architectures Countermeasures And Challenges First Edition Anagnostop...
Industrial communication technology handbook Second Edition Richard Zurawski
Information Security Handbook (Internet of Everything (IoE)) 1st Edition Vari...
Security Engineering For Embedded And Cyberphysical Systems Saad Motahhir
Ai Factory Theories Applications And Case Studies Ramin Karim
5G Wireless Communication System in Healthcare Informatics 1st Edition Manoj ...
Value Added Services for Next Generation Networks Informa Telecoms Media 1st ...
Cybersecurity for Industrial Control Systems SCADA DCS PLC HMI and SIS 1st Ed...
WiMAX Applications 1st Edition Syed A. Ahson
Explainable Artificial Intelligence For Intelligent Transportation Systems Am...
WiMAX Applications 1st Edition Syed A. Ahson
Handbook Of Smart Manufacturing Dr Ajay Kumar
Contextaware Pervasive Systems 1st Edition Seng Loke
WiMAX Applications 1st Edition Syed A. Ahson 2024 Scribd Download
Security in Distributed Grid Mobile and Pervasive Computing 1st Edition Yang ...
Bitcoin and blockchain: history and current applications Balas
Ad

Recently uploaded (20)

PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
master seminar digital applications in india
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Lesson notes of climatology university.
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Institutional Correction lecture only . . .
PDF
Sports Quiz easy sports quiz sports quiz
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
GDM (1) (1).pptx small presentation for students
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Basic Mud Logging Guide for educational purpose
PDF
Computing-Curriculum for Schools in Ghana
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
master seminar digital applications in india
Microbial diseases, their pathogenesis and prophylaxis
Supply Chain Operations Speaking Notes -ICLT Program
Lesson notes of climatology university.
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Institutional Correction lecture only . . .
Sports Quiz easy sports quiz sports quiz
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPH.pptx obstetrics and gynecology in nursing
GDM (1) (1).pptx small presentation for students
O5-L3 Freight Transport Ops (International) V1.pdf
Insiders guide to clinical Medicine.pdf
Cell Structure & Organelles in detailed.
Basic Mud Logging Guide for educational purpose
Computing-Curriculum for Schools in Ghana
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Ad

Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan

  • 1. Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan - PDF Download (2025) https://ebookultra.com/download/cyber-security-for-next- generation-computing-technologies-1st-edition-inam-ullah-khan/ Visit ebookultra.com today to download the complete set of ebooks or textbooks
  • 2. We have selected some products that you may be interested in Click the link to download now or visit ebookultra.com for more options!. Check Point Next Generation Security Administration 1st Edition Syngress https://ebookultra.com/download/check-point-next-generation-security- administration-1st-edition-syngress/ Next Generation IPTV Services and Technologies 1st Edition Gerard O'Driscoll https://ebookultra.com/download/next-generation-iptv-services-and- technologies-1st-edition-gerard-odriscoll/ E Infrastructures and Technologies for Lifelong Learning Next Generation Environments 1st Edition George Magoulas https://ebookultra.com/download/e-infrastructures-and-technologies- for-lifelong-learning-next-generation-environments-1st-edition-george- magoulas/ Security Management of Next Generation Telecommunications Networks and Services 1st Edition Stuart Jacobs(Auth.) https://ebookultra.com/download/security-management-of-next- generation-telecommunications-networks-and-services-1st-edition- stuart-jacobsauth/
  • 3. Next Generation SOA A Real World Guide to Modern Service Oriented Computing 1st Edition Thomas Erl https://ebookultra.com/download/next-generation-soa-a-real-world- guide-to-modern-service-oriented-computing-1st-edition-thomas-erl/ Digital Security Cyber Terror and Cyber Security The Digital World 1st Edition Ananda Mitra https://ebookultra.com/download/digital-security-cyber-terror-and- cyber-security-the-digital-world-1st-edition-ananda-mitra/ Cyber Security and Network Security 1st Edition Sabyasachi Pramanik https://ebookultra.com/download/cyber-security-and-network- security-1st-edition-sabyasachi-pramanik/ Computational Methods for Next Generation Sequencing Data Analysis 1st Edition Ion Mandoiu https://ebookultra.com/download/computational-methods-for-next- generation-sequencing-data-analysis-1st-edition-ion-mandoiu/ Cyber Security 1st Edition Jocelyn O. Padallan https://ebookultra.com/download/cyber-security-1st-edition-jocelyn-o- padallan/
  • 5. Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan Digital Instant Download Author(s): InamUllah Khan, Abou el Houba,Maria Ouaissa ISBN(s): 9781003404361, 1003404367 Edition: 1 File Details: PDF, 8.96 MB Year: 2024 Language: english
  • 7. Cyber Security for Next-Generation Computing Technologies This book sheds light on the cyber security challenges associated with next- generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes. KEY FEATURES • Highlights innovative principles and practices using next generation computing technologies based cybersecurity. • Presents an introduction to recent trends regarding the convergence of AI/ML in cybersecurity • Offers an overview of theoretical, practical, simulation concepts of cybersecurity
  • 9. Cyber Security for Next-Generation Computing Technologies Edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, and Muhammad Fazal Ijaz Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business
  • 10. Designed cover image: Shutterstock First edition published 2024 by CRC Press 2385 NW Executive Center Drive, Suite 320, Boca Raton FL 33431 and by CRC Press 4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN CRC Press is an imprint of Taylor & Francis Group, LLC © 2024 selection and editorial matter, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz; individual chapters, the contributors Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www. copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978–750–8400. For works that are not available on CCC please contact mpkbookspermissions@tandf.co.uk Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. ISBN: 978-1-032-51899-2 (hbk) ISBN: 978-1-032-51900-5 (pbk) ISBN: 978-1-003-40436-1 (ebk) DOI: 10.1201/9781003404361 Typeset in Times by Apex CoVantage, LLC
  • 11. v Contents Preface......................................................................................................................vii About the Editors......................................................................................................ix List of Contributors................................................................................................ xiii Chapter 1 Cyber Security: Future Trends and Solutions ......................................1 Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, and Gowhar Mohi ud din Dar Chapter 2 Security and Intelligent Management: Survey................................... 16 Zaigham Abbas, Abdul Qahar Shahzad, Muhammad Yaseen Ayub, and Muhammad Allah Rakha Chapter 3 Comparative Analysis of Machine and Deep Learning for Cyber Security..............................................................................39 Hafsa Maryam, Syeda Zillay Nain Zukhraf, and Rehmat Ullah Chapter 4 AI-Based Secure Wireless Communication Technologies and Cyber Threats for IoT Networks ........................................................70 Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan, and Salma El Hajjami Chapter 5 Cyber Threat Actors Review: Examining the Tactics and Motivations of Adversaries in the Cyber Landscape ..................84 Zakaria Abou El Houda Chapter 6 Layer-Based Security Threats in IoT Networks...............................102 Muna Muhammad, Ahthasham Sajid, and Hira Arshad Chapter 7 Intrusion Detection System Using AI and Machine Learning Algorithm..........................................................120 Muhammad Tehmasib Ali Tashfeen Chapter 8 Signature-Based Intrusion Detection System for IoT....................... 141 Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan, and Muhammad Fayaz
  • 12. vi Contents Chapter 9 Hybrid Model for IoT-Enabled Intelligent Towns Using the MQTT-IoT-IDS2020 Dataset............................................................ 159 Zupash, Muhammad Allah Rakha, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, and Muhammad Yaseen Ayub Chapter 10 Cyber Security for Edge/Fog Computing Applications................... 177 Hanane Lamaazi Chapter 11 Cyber Attacks Against Intelligent Transportation Systems.............190 Muhammad Usama, Ubaid Ullah, and Ahthasham Sajid Chapter 12 Intelligent Transportation Systems for IoT-Based UAV Networks.................................................................................. 231 Mamoona Jamil, Usman Haider, Inam Ullah Khan, and Tarandeep Kaur Bhatia Chapter 13 Cyber Attack Detection Analysis Using Machine Learning for IoT-Based UAV Network ............................................................253 Usman Haider, Hina Shoukat, Muhammad Yaseen Ayub, Muhammad Tehmasib Ali Tashfeen, Tarandeep Kaur Bhatia, and Inam Ullah Khan Chapter 14 Blockchain Solutions for Cyber Criminals ......................................265 Vijendra Kumar Maurya, Denis Jangeed, Latif Khan, and Bhupendra Kumar Soni Chapter 15 Blockchain Security Measures to Combat Cyber Crime ................. 275 Rahmeh Ibrahim and Qasem Abu Al-Haija Chapter 16 AI Classification Algorithms for Human Activities Recognition System With a Cyber Security Perspective .................294 Fahad Naveed, Shahbaz Ali Imran, Aftab Alam Janisar, Aliyu Yusuf, Salman Khan, and Inam Ullah Khan
  • 13. vii Preface The field of cyber security has recently gained significant importance as the chal- lenge of securing information transmission becomes crucial. The advent of smart IT infrastructure has revolutionized the global landscape, but it has also brought forth security concerns. Consequently, cyber crimes have witnessed a steady rise over time, involving activities such as identity theft, bullying, terrorism, and network disruptions. In this smart world, privacy and security have become indispensable for individuals. Fortunately, the next generation of computing technologies, including IoT/IoE, artificial intelligence, machine learning, deep learning, smart grid, ad hoc networks, SDN, network security, big data, image processing, and green communi- cation, offers potential solutions. The integration of these fields encompasses cyber attacks, forensic analysis, and privacy issues, necessitating exploration through optimization techniques and evolu- tionary computations. Next-generation computing finds diverse applications in areas like smart infrastructure, air quality monitoring, waste management, school man- agement, healthcare, and telemedicine. These applications rely on security measures to facilitate optimal decision making in real time. Ad hoc networks play a crucial role in reducing end-to-end delays and connectivity problems, while wireless com- munication technology serves as the backbone of future networks. Governments, enterprises, and individuals must prioritize cyber security and utilize forensic tech- niques to protect data when sharing it with others, as privacy concerns arise due to potential security breaches during extensive data sharing. Analyzing complex information and real-time data is essential for ensuring the sustainability of future networks and related applications. This book sheds light on the cyber security challenges associated with next- generation computing technologies, emphasizing the serious threats posed to individ- uals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes. Chapter 1 provides an overview of cyber security, exploring its impact on busi- nesses and analyzing recent trends and future solutions. Chapter 2 focuses on security and intelligent management to ensure system safety. Chapter 3 presents a comprehensive study of machine learning (ML) and deep learning (DL) techniques for detecting potential cyber attacks, while Chapter 4 surveys AI-based applications, intrusion detection systems (IDS), cyber attacks on IoT networks, and AI tools.
  • 14. viii Preface Chapter 5 aims to investigate the tactics and motivations of cyber threat actors in the current cyber security landscape, while Chapter 6 conducts a detailed review of security threats and attacks across different layers of IoT systems. Chapter 7 demon- strates how an intrusion detection system using AI and ML can function effectively out of the box, and Chapter 8 provides a detailed survey on signature-based IDS for IoT environments. In Chapter 9, a hybrid model is proposed for identifying attacks on IoT-enabled smart cities. Chapter 10 offers an overview of cyber security in edge/fog computing applica- tions, highlighting potential risks, common attack vectors, and best practices for security. Chapter 11 explores various cyber security attacks targeting intelligent transportation systems (ITS), including phishing attacks, malware, remote access, denial of service (DoS) attacks, physical attacks, insider threats, and social engi- neering. Chapter 12 presents a comprehensive survey of security attacks in UAV networks and other intelligent transportation systems, while Chapter 13 conducts a comparative study of machine learning techniques to investigate trust in IoT-based aerial ad hoc networks. Chapter 14 delves into the applications of blockchain technology in cyber security and the security solutions it offers, while Chapter 15 expands on blockchain con- cepts, components, architecture, features, types, and limitations. Lastly, Chapter 16 focuses on human activity recognition problems from a cyber security perspective, proposing a novel method for accurate human activity recognition through different algorithms.
  • 15. ix About the Editors Dr. Inam Ullah Khan is a visiting researcher at King’s College London, UK. Dr. Khan was a lecturer at different universities in Pakistan, including the Center for Emerging SciencesEngineering&Technology(CESET),Islamabad,AbdulWaliKhanUniversity, Garden and Timergara Campus, and University of Swat. He did his PhD in Electronics Engineering from the Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He completed his MS degree in Electronic Engineering at the Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He obtained his undergraduate degree in Bachelor of Computer Science from Abdul Wali Khan University Mardan, Pakistan. In addition, his master’s thesis was published as a book, Route Optimization with Ant Colony Optimization (ACO) (Lambert Academic Publishing, 2017), in Germany, which is available on Amazon. He is a research scholar and has published research papers at the international level. More interestingly, he recently introduced a novel on routing protocol E-ANTHOCNET in the area of flying ad hoc networks. His research interests include network system security, intrusion detec- tion, intrusion prevention, cryptography, optimization techniques, WSN, IoT, UAVs, mobile ad hoc networks (MANETS), flying ad hoc networks, and machine learning. He has served at international conferences as a technical program committee mem- ber, which include the EAI International Conference on Future Intelligent Vehicular Technologies, Islamabad, Pakistan, and the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, June 26–27, 2018, and has been recently working on the same level at the International Workshop on Computational Intelligence and Cybersecurity in Emergent Networks (CICEN’21) that will be held in conjunction with the 12th International Conference on Ambient Systems, Networks and Technologies (EUSPN 2021), which was co-organized in November 1–4, 2021, in Leuven, Belgium. He has published more than 20 research papers (including book chapters, peer-reviewed journal articles, and peer-reviewed conference manuscripts) and three edited books. Dr. Mariya Ouaissa is currently a Professor in Cybersecurity and Networks at Cadi Ayyad University and a practitioner with industry and academic experience. She obtained a PhD in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, hav- ing graduated in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is a co-founder and IT consultant at the IT Support and Consulting Center. She worked for the School of Technology of Meknes Morocco as Visiting Professor from 2013 to 2021. She is a member of the International Association of Engineers and International Association of Online Engineering, and since 2021, she is an ACM Professional Member. She is Expert Reviewer with the Academic Exchange Information Centre (AEIC) and Brand Ambassador with Bentham Science. She has served and continues to serve on technical program and organizer committees of
  • 16. x About the Editors several conferences and events and has organized many symposiums/workshops/ conferences as a general chair and as a reviewer of numerous international jour- nals. Dr. Ouaissa has made contributions in the fields of information security and privacy, Internet of Things security, and wireless and constrained networks secu- rity. Her main research topics are IoT, M2M, D2D, WSN, cellular networks, and vehicular networks. She has published over 40 papers (book chapters, international journals, and conferences/workshops), ten edited books, and eight special issues as guest editor. Dr. Mariyam Ouaissa is currently Assistant Professor of Networks and Systems at Chouaib Doukkali University. She received her PhD degree in 2019 from the National Graduate School of Arts and Crafts, Meknes, Morocco, and her Engineering Degree in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is a communication and networking researcher and practitioner with industry and academic experience. Dr. Ouaissa’s research is multidisciplinary and focused on the Internet of Things, M2M, WSN, vehicular communications and cellular networks, security networks, congestion overload problems, and resource allocation manage- ment and access control. She is serving as a reviewer for international journals and conferences, including IEEE access, wireless communications, and mobile com- puting. Since 2020, she is a member of the International Association of Engineers IAENG and International Association of Online Engineering, and since 2021, she is an ACM Professional Member. She has published more than 30 research papers (this includes book chapters, peer-reviewed journal articles, and peer-reviewed con- ference manuscripts), ten edited books, and six special issue as guest editor. She has served on program committees and organizing committees of several conferences and events and has organized many symposiums/workshops/conferences as a gen- eral chair. Dr. Zakaria Abou El Houda is a researcher at the Université de Montréal, Montréal, Canada. He received an MSc degree in Computer Networks from Paul Sabatier University, Toulouse, France, his PhD degree in Computer Science from the University of Montréal, Canada, and PhD degree in Computer Engineering from the University of Technology of Troyes, Troyes, France. He has made contributions in the fields of information security, intrusion detection/prevention system, and security in software-defined networks. His current research interests include ML/DL-based intrusion detection, federated learning, and blockchain. He has also served and con- tinues to serve on technical program committees and as a reviewer of several inter- national conferences and journals, including IEEE ICC, IEEE Globecom, and IEEE Transactions. Dr. Muhammad Fazal Ijaz received his BEng degree in Industrial Engineering and Management from University of the Punjab, Lahore, Pakistan, in 2011, and his DrEng degree in Industrial and Systems Engineering from Dongguk University, Seoul, South Korea, in 2019. From 2019 to 2020, he worked as Assistant Professor in the Department of Industrial and Systems Engineering, Dongguk University, Seoul, South Korea. Currently, he is working as Assistant Professor in the Department of
  • 17. xi About the Editors Intelligent Mechatronics Engineering, Sejong University, Seoul, Korea. He has pub- lished numerous research articles in several international peer-reviewed journals, including Scientific Reports, IEEE Transactions on Industrial Informatics, IEEE Access, Sensors, Journal of Food Engineering, Applied Sciences, and Sustainability. His research interests include machine learning, blockchain, healthcare engineering, the Internet of Things, big data, and data mining.
  • 19. xiii Contributors Zaigham Abbas International Islamic University Islambad, Pakistan Qasem Abu Al-Haija Princess Sumaya University for Technology Jordan Syed Immamul Ansarullah Government Degree College Sumbal Srinagar, India Hira Arshad Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan Muhammad Yaseen Ayub COMSATS University Attock Campus, Pakistan Tarandeep Kaur Bhatia University of Petroleum and Energy Studies (UPES) Bidholi, India Gowhar Mohi ud din Dar Lovely Professional University Phagwara, India Salma El Hajjami Ibnou Zohr University Agadir Morocco Zakaria Abou El Houda L@bISEN, ISEN Yncréa Ouest Carquefou, France Muhammad Fayaz University of Central Asia Naryn Kyrgyzstan Usman Haider National University of Computer and Emerging Sciences Islamabad, Pakistan Rahmeh Ibrahim Princess Sumaya University for Technology Jordan Shahbaz Ali Imran Birmingham City University Birmingham, UK Mamoona Jamil Isra University Islamabad Pakistan Denis Jangeed Geetanjali Institute of Technical Studies Udaipur, India Aftab Alam Janisar Universiti Teknologi Petronas Seri Iskandar, Perak, Malaysia Inam Ullah Khan Isra University Islamabad Campus Pakistan Latif Khan Geetanjali Institute of Technical Studies Udaipur, India Salman Khan Abdul Wali Khan University Mardan Pakistan Mudasir Manzoor Kirmani FoFy, SKAUST-Kashmir India
  • 20. xiv Contributors Hanane Lamaazi College of Information Technology UAE University, Abu Dhabi, United Arab Emirates Hafsa Maryam University of Cyprus Nicosia, Cyprus Vijendra Kumar Maurya Geetanjali Institute of Technical Studies Udaipur, India Muna Muhammad Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan Ziema Mushtaq Cluster University Srinagar India Fahad Naveed Federal Urdu University of Arts Science & Technology Islamabad, Pakistan Bakhtawar Nawaal University of Engineering and Technology Taxila, Pakistan Mariya Ouaissa Cadi Ayyad University Marrakech, Morocco Mariyam Ouaissa Chouaib Doukkali University El Jadida, Morocco Muhammad Allah Rakha FAST National University Peshawar, Pakistan Ahthasham Sajid Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan Abdul Qahar Shahzad Quaid-I-Azam University Islamabad, Pakistan Hina Shoukat COMSATS University Islamabad Attock, Pakistan Bhupendra Kumar Soni Geetanjali Institute of Technical Studies Udaipur, India Muhammad Tehmasib Ali Tashfeen Wichita State University Wichita, Kansas, United States Rehmat Ullah Cardiff Metropolitan University Cardiff, UK Ubaid Ullah University of Wah Wah Cantt, Pakistan Muhammad Usama University of Wah Wah Cantt, Pakistan Aliyu Yusuf Universiti Teknologi Petronas Seri Iskandar, Perak, Malaysia Syeda Zillay Nain Zukhraf University of Cyprus, Nicosia, Cyprus Department of Electrical Engineering National University of Computer and Emerging Sciences Peshawar, Pakistan Zupash COMSATS University Islamabad Attock, Pakistan
  • 21. 1 DOI: 10.1201/9781003404361-1 Cyber Security 1 Future Trends and Solutions Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, and Gowhar Mohi ud din Dar 1.1 INTRODUCTION Before the beginning of 1970, viruses, Trojan horses, worms, spyware, and malware were not even part of the mainstream lexicon of information technology. Robert Thomas, a BBN Technologies researcher in Cambridge, Massachusetts, created the first computer “worm” and named that “Creeper” [1]. By jumping between systems, the Creeper disseminated infection; to combat this virus, Ray Tomlinson created the Reaper, the first antivirus application that would seek out and destroy Creeper [2]. In 1988, Robert Morris desired to determine the magnitude of the Internet and to accomplish this, he developed software that accessed UNIX terminals, traversed networks, and cloned itself. The Morris worm was so destructive that it rendered computers unusable by substantially reducing their speed [3]. From that moment on, viruses became more lethal, pervasive, and difficult to manage. With it came the advent of cyber security. The collective set of technology, methods, and procedures that businesses utilize to safeguard their computing environments from harm and unauthorized data access caused by online criminals or nefarious insiders is known as cyber security [4]. Organizations typically have a structure and system in place for dealing with attempted or successful cyber attacks. An effective framework can aid in threat detection and identification, network and system protection, and recovery in the event that an attack is successful. Cybersecurity is included in all systems that are vulnerable to threats and attacks to stop things like identity theft, cyber stalking, data loss, loss of sensitive data, and extortion attempts [5]. Sensitive information about themselves as well as their clients is held by critical infrastructures, including hospitals, financial services firms, power plants, etc. To operate without interruption, cyber threat researchers find new vulnerabilities, improve open-source tools, and inform people about the significance of cyber security. Since the introduction of the first mainframes, the CIA (confiden- tiality, integrity, and availability) triangle has been the de facto industry standard for computer security [6]. Figure 1.1 shows the CIA triad in cybersecurity. • Confidentiality: Maintaining confidentiality requires not divulging infor- mation to unauthorized parties. It involves making an effort to safeguard the privacy and anonymity of authorized parties engaged in data sharing
  • 22. 2 Cyber Security for Next-Generation Computing Technologies and storage. Decrypting data that has been inadequately encrypted, man- in-the-middle (MITM) attacks, and disclosing sensitive information fre- quently compromise secrecy. Data encryption, two-factor authentication, biometric verification, security tokens, and other standard procedures are utilized to protect confidentiality. • Integrity: Integrity relates to preventing unauthorized parties from altering information. It is required that information and programs can only be modified in certain and authorized ways. Integrity risks include turning a computer into a “zombie computer” and infecting online pages with malware. Typically, the following methods are used to ensure data integrity: cryptographic checksums, uninterrupted power supplies, data backups, etc. • Availability: Availability ensures that the information is accessible to authorized users when required. Data is only helpful if it is accessible to the right people at the right time. Information inaccessibility may result from security vulnerabilities such as DDoS attacks, hardware failure, poor soft- ware, or human error. Common practices for ensuring availability include backing up data to external drives, installing firewalls, having a backup power supply, and replicating data. FIGURE 1.1 CIA (confidentiality, integrity, and availability) triad in cyber security.
  • 23. 3 Cyber Security 1.2 TYPES OF CYBER SECURITY Cyber security can broadly be divided into seven pillars [7–9]: 1. Network Security: A planned set of guidelines and configurations is used to secure networks and data by ensuring their confidentiality, integrity, and accessibility. By safeguarding the infrastructure, network security aims to defend internal networks from intruders. The majority of attacks take place across networks, and network security solutions are made to spot and stop these attacks. These solutions incorporate data and access controls, includ- ing next-generation firewall (NGFW) application restrictions, network access control (NAC), data loss prevention (DLP), identity access manage- ment (IAM), and NAC (identity access management), to enact safe online use regulations. Technologies for advanced and multilayered network threat prevention include NGAV (next-gen antivirus), sandboxing, and CDR (con- tent disarm and reconstruction). Additionally significant are automated SOAR (security orchestration and response) solutions, threat hunting, and network analytics [10]. 2. Cloud Security: Technology, services, controls, and policies that safe- guard cloud data, infrastructure, and applications against online threats and attacks are referred to as cloud security [11]. Although a lot of cloud service providers offer security solutions, these are sometimes insufficient for pro- viding enterprise-grade security in the cloud. Amazon AWS and Microsoft Azure are two examples of public cloud computing, while VMmare or OpenStack are examples of private clouds. The multi-cloud aspect of cloud security presents several unique issues, including visibility, compliance, and cost control. Enabling MFA on all accounts, enabling security logs, encrypting your data, and double-checking your compliance needs are the standard procedures to take into account for cloud security. 3. Mobile Security: Mobile security, also referred to as wireless security, is the safeguard put in place to protect mobile devices like laptops, tablets, and smartphones, as well as the networks to which they are linked, from the dangers and risks associated with wireless computing [12]. Mobile devices like tablets and smartphones, which are frequently disregarded, have access to company data, putting firms at risk from phishing, malicious software, and IM (instant messaging) assaults. These attacks are stopped by mobile security, which also protects operating systems and devices from rooting. This enables businesses to guarantee that only compliant mobile devices have access to company assets when combined with an MDM (mobile device management) solution. 4. Endpoint Security: Companies must protect end user devices like desk- tops/laptops and servers, mobile devices, network devices (routers, switches, and access points) with endpoint detection and response (EDR) solutions, advanced threat prevention (such as anti-phishing and anti-ransomware), and data and network security controls [13].
  • 24. 4 Cyber Security for Next-Generation Computing Technologies 5. IoT Security: Although deploying Internet of Things (IoT) devices undoubt- edly increases productivity, it also exposes businesses to new online threats. Threat actors look for weak devices that are unintentionally connected to the Internet in order to utilize them for illicit purposes like gaining access to corporate networks. With the help of auto-segmentation to manage net- work activity, discovery and classification of connected devices, and the use of IPS as a virtual patch to thwart attacks on susceptible IoT devices, IoT security safeguards these gadgets [14]. To guard against exploits and run- time attacks, the firmware of the device may in some situations be supple- mented with tiny agents. 6. Application Security: Addressing vulnerabilities originating from unsafe development procedures when creating, coding, and releasing software or a website is known as application security. It is crucial to integrate security standards, procedures, methods, and tools to safeguard applications dur- ing all phases of development because applications are directly accessible across networks. Cross-site scripting (XSS), DDoS attacks, lax access con- trols, a lack of encryption, etc. are problems with application security [15]. Risk assessment, patching, secure development, web application firewalls, encryption software, and application security testing are some of the proce- dures and solutions to take into consideration for this kind of cyber security. 7. Zero Trust: Zero trust security, which takes a more granular approach to security by securing specific resources through a mix of micro- segmentation, monitoring, and the implementation of role-based access controls, means that, by default, no one is trusted from inside or outside the network [16]. Continuous monitoring and validation, least privilege, device access control, micro-segmentation, preventing lateral movement, and mul- tifactor authentication are the core tenets of zero trust. 1.3 CYBER SECURITY THREATS The main types of cyber security threats that companies face today are discussed next. 1.3.1 MALWARE Malware is malicious software designed to perform a range of unwanted tasks on a compromised machine [17]. Some of the most common kinds of malicious software are: • Ransomware: Files on a device infected with ransomware are encrypted using a key known only to the attacker. The creator of the ransomware then asks money in exchange for the decryption key [18]. Ransomware has become one of the most widespread and expensive cyber dangers that busi- nesses face in recent years. • Trojan Horse: Trojan horses are a type of malicious software that can trick users into downloading it by seeming to be a legitimate, free version of a
  • 25. 5 Cyber Security paid program. After a victim downloads and runs the Trojan, it will begin performing malicious actions on the infected machine [19]. • Remote Access Trojan (RAT): Trojans designed to serve as a backdoor for additional attacks are known as remote access Trojans (RATs). Once the virus is active on an infected machine, the attacker gains access to the system remotely and can then steal data, install further malware, or execute other malicious activities [20]. • Spyware: Spyware is a form of malware that monitors a user’s activity on their computer and records that data. Hackers create spyware to gain access to private information that may be sold or used in future assaults [21]. This information can include login credentials, financial data, and other sensitive details. • Cryptojacking: In order to add new blocks to the blockchain, Proof of Work (PoW) cryptocurrencies require a computationally intensive process called mining. In order to mine cryptocurrency, cryptojacking malware installs itself on a compromised computer and uses its processing power to create blocks [22]. 1.3.2 SOCIAL ENGINEERING ATTACKS Social engineering attacks involve deception, compulsion, and other forms of psy- chological manipulation to persuade the target to perform the desired action. Typical instances of social engineering techniques are as follows: • Phishing: Phishing is one form of social engineering in which the target is tricked into providing information or doing some other action that benefits the attacker [23]. The goal of phishing is to trick users (using emails, social media posts, and other kinds of electronic communication) into visiting a harmful website, downloading a malicious file, or providing personal infor- mation such as passwords. • Spear Phishing: Spear phishing assaults are a type of phishing in which the attacker tries to trick a specific person or group into giving over sensitive information by posing as a trustworthy organization [24]. A spear phishing email sent to the accounts payable clerk can, for instance, falsely claim to be from one of the company’s legitimate vendors or suppliers, demanding payment for goods or services already rendered. • Smishing: What we call “smishing” attacks originate from “phishing,” except they use text messages instead of email [25]. These attacks take advantage of smartphone features, such as the ability to hover the mouse over an SMS link to see where it leads and the prevalence of link shortening services (like bit.ly). • Vishing (Voice-Based Phishing): Vishing uses similar techniques to phishing but takes place over the phone. Convincing a victim to do a mali- cious action or reveal private information like passwords or credit card numbers is an attack technique [26].
  • 26. Other documents randomly have different content
  • 27. 37.—​ Paddock’s left again stopped, and Jones returned on the side of the wig-block. Paddock then popped in his left with effect on the mouth, and after some more exchanges Paddock got down. He looked round anxiously at Jones, as he was being carried to his corner, and evidently wished his work was done. 38.—​ Paddock made his right heavily on Jones’s body, and then his left on the side of his head. Both now pegged away with determination, and in a most unflinching way, as if they had received fresh vigour. The hitting, however, was in favour of Paddock, and in the end Jones fell weak. It had evidently been an expiring effort on his part to get a decided lead, and having failed it was now patent to all that his defeat was a mere question of time. 39.—​ Paddock let go his left on the side of Aaron’s cheek, which led to some severe counter-hits. They then closed, and Paddock pegged away with his right at the ribs until both were down. 40.—​ Some slight exchanges, without mischief, and Jones down. 41.—​ Paddock came up with an awful grin; his single open peeper glaring in a most ludicrous manner. He tried to lead off, but napped it on the smeller and left ear, from which the main was again tuned on. Paddock then made his right on the ribs, and Jones dropped. 42.—​ Paddock again effected a heavy right-handed delivery on the ribs, and after slight exchanges both were down. 43.—​ Slight exchanges, in which neither was effective, and in a scramble they fell. Paddock under. 44.—​ Jones attempted to lead off, but was easily stopped; Paddock returning heavily on his left eye, and then on the
  • 28. body, again screwed his courage to the sticking-place, and a second with his right and got down. 45.—​ Paddock led off, but was short. In another attempt he reached Aaron’s damaged bread-basket, and dropped à la Bendigo. He jumped up to renew the fight, when Jones nailed him on the left side of his brain-pan, and Tom finally dropped to end this round. 46.—​ Jones tried to lead, but was very slow, and easily stopped. Paddock again reached his ribs with his right, and a sharpish rally ended in their failing together at the ropes. 47.—​ Paddock’s left was out of distance; he tried his right at the body but missed, and Jones dashing in, caught him on the right cheek slightly, and fell on his face. 48.—​ Counter-hits with the left, Paddock catching Jones very heavily on the left temple, and dropping him as if shot. 49.—​ Jones, very slow to the call of time, at length came up wildly. He staggered in to close, and they fell, Jones under. 50.—​ Jones, alter a futile attempt to punish, fell weak. 51.—​ Slight exchanges, but no mischief, and both down. 52.—​ Wild, swinging hits which did not get home. Paddock then planted his right heavily on the ribs, and again got down, amidst loud hisses. There was no appeal to the referee, and the fight proceeded. 53.—​ Paddock let go his left on the mouth; slight exchanges followed, and they then fell on their backs. Both were much exhausted, but Paddock was the stronger on his pins. 54.—​ After slight exchanges, Paddock again made his right at the ribs, and got down.
  • 29. 55.—​ Paddock led off, but was stopped. They then got close, and some slight fibbing ended in Jones seeking Mother Earth. Paddock stood looking at him, as much as to say, “Why don’t you cut it?” until he was carried to his corner. 56.—​ Jones attempted to lead off, but Paddock countered him heavily on the cheek, and he fell, amidst cries of “Take him away.” 57.—​ Jones, although slow to time, came up steadily, and succeeded in putting in a little one “on the place where Tom’s eye ought to be,” and having received in return on the proboscis, he fell on his latter end. 58.—​ Paddock rushed in to finish, but Jones, to the surprise of all, stopped him, and some heavy counter-hits took place. Paddock getting another crack on his disfigured nob, and hitting Jones down by a spank on the dice-box. 59.—​ Paddock planted his left on Jones’s kissing-organ heavily, opening a fresh tap, and Aaron again dropped. For two more rounds did Jones stagger up to the scratch, but it was only to receive—​ all the steel was out of him—​ he was extremely weak on his legs, one eye was closed, and the other following suit; his nose, mouth, and ribs were severely damaged, while Paddock—​ although tremendously disfigured about the title-page—​ had still a little “go” left in his trotters. Every one begged of Jones or his seconds on his behalf to give in, but the gallant fellow persevered against hope until the close of the 61st round, when getting another heavy crack on the mouth, he fell, almost senseless, and his seconds threw up the sponge in token of defeat, at the end of one hour and twenty-nine minutes. Poor Aaron, who had done all he could do to turn the tide in his favour, was much mortified by this second defeat at the hands of Paddock, and cried like a child. He could scarcely walk on leaving the ring, and was obliged to lie down on an adjacent bank for some time before
  • 30. he could be removed to the station. Paddock was no great shakes, and was evidently much delighted that his task was at an end. He went into the ring with a full conviction that he should not gain a bloodless victory, and that he should get his brain-pan pretty well knocked about, but we question whether even he, confident as he was, anticipated that it would be quite so “hot” as it turned out. Remarks.—​ Every one who witnessed the above battle will cordially agree with us that it was a determined, manly struggle for pre-eminence throughout. It clearly demonstrated to our mind, however, the fact that Jones does not possess sufficient physique to enable him to contend successfully against such a hardy bit of stuff as Tom Paddock. True, he is a harder hitter than Paddock, but then, after a time, unless a man has a frame of iron, this gift is materially diminished by the constant jar; and a determined adversary, with such a granite nob as Tom Paddock, capable of receiving almost any amount of punishment, is almost certain to last longest at mere give-and-take fighting, as was fully proved on Tuesday. Jones, notwithstanding he had received hints from the most accomplished boxer of the day, Jem Ward, still persevered in his old system of hitting principally with his right-hand, a practice which, although it altered Paddock’s physiognomy in the most extraordinary manner on one side, still was not calculated, unattended as it was by much execution from his left, to reduce his opponent to a state of darkness. He punished Paddock more than that hero was ever punished before, and we believe that, did he possess more wear and tear, it would have been a much nearer thing than it was. He had for some time the best of the hitting, but, falling weak, the inequality was quickly removed by the determination of Paddock, who, seeing that he had his work to do, never gave Jones breathing time to collect his faculties.
  • 31. The Old Tipton being matched with Aaron Jones, and Harry Broome being supposed to have retired from pugilism to publicanism, Tom was standing idle in the market-place, when on the 2nd of December he was enlivened by reading the following in the Ring column of Bell, under the heading of “Who is to have the Belt?” A new one having been just put into the hands of a fashionable goldsmith from the proceeds of a public subscription: “Mr. Editor,—​ It was my intention never to have entered the roped arena again, but the persuasions of my old friends and backers have determined me to pull off my shirt once more. I now come forward for the satisfaction of the public and the Prize Ring, in order to determine who’s the better man, Tom Paddock or myself. I will fight him for £200 a side for the Champion’s Belt, which I feel I am entitled to, for both the Tipton Slasher and Aaron Jones have been beaten by me or by men that I have beaten, and therefore I claim it, and shall do so until fairly beaten in a roped ring, as a trophy of that description ought to be contested for man to man, and never obtained upon a mere challenge. To prove that I mean to carry out what I state, I will meet Paddock at your office on Wednesday, Dec. 12, to sign articles, to which the following condition must be attached:—​ The money not, under any circumstances, to be parted with until fairly won or lost in a 24 feet roped ring. Should this not suit Paddock (not that I wish to interfere with the match between the Tipton Slasher and Aaron Jones) I will fight Aaron Jones for £200 a side, whether he wins or loses with the Tipton Slasher. By inserting this, you will oblige.—​ Yours, &c., “HENRY BROOME.”
  • 32. “Bell’s Life” Tavern, Strand, November 28, 1855. Paddock lost no time in calling on the stakeholder, and leaving £10 early in the next week, under condition that if he could not raise £200, they should meet for £100. Broome did not flinch, and, after two more “conditional” deposits, articles were signed in the editorial sanctum of Bell’s Life, by which Thomas Paddock and Henry Broome mutually bound themselves to fight for £200 a side, on Monday, May 19th, 1856, within 100 and over 50 miles from London. The anxiety in boxing circles, as the day drew near and all was found progressing smoothly to the desired issue, became intense; and Alec Keene’s “Three Tuns,” in Moor Street, whence Paddock was backed, and Harry’s own house, the newly named “Bell’s Life” Tavern (now the “Norfolk Arms”), in the Strand, were crowded with curious inquirers as to how the men went on, and for “the straight tip.” On the day previous both champions showed, and the distribution of colours—​ a blue with white spot for Broome, and a blue with a white check for Paddock—​ on the usual terms of a guinea or “nothing,” was extensive. Paddock was closely scrutinised by both friends and foes, each equally anxious to ascertain whether time or previous contests had impaired his freshness or vigour; but no traces of deterioration
  • 33. were there, and those who felt his muscle declared their belief that he was never in finer trim. Harry’s appearance, so far as his face was concerned, was that of perfect health, and the disappearance of the protuberance which had long been visible under his waistcoat was remarkable. These signs of careful training, with the prestige of his name, carried the odds to 6 and 7 to 4 in his favour. We knew that he worked hard and was most creditably abstemious; but we feared, as the sequel proved, that he was unable to train efficiently, and that strength was lost in the great reduction of weight to which he had been subjected. It had been the original intention of the backers of the men to have given the inhabitants of Kent and Sussex the opportunity of a view of this encounter; but it proved, upon inquiry, that it was impossible to obtain a “special” on those lines, as some saints in the directorate of the companies had issued an ukase against such “excursions” as were not to their own taste or under their own patronage. Recourse was, therefore, had to the Eastern Counties, where the necessary facilities for an excursion of “Odd Fellows” was applied for and granted. It was suggested to the “managers” of the “outing”—​ Alec Keene, Fred Broome, and Dan Dismore—​ that any invasion of the
  • 34. territory of Cambridge, Huntingdon, or the country round Mildenhall or Brandon, would inevitably be resisted; so these worthies, after consultation with experienced strategists, deemed it prudent to abandon the old and beaten track, and strike out a new plan of campaign. The company’s agent was, therefore, apprised that the excursionists wished to pass through Suffolk into Norfolk, by the Eastern Union Line, as their place of reunion would be a few miles beyond Ipswich. The officials made their arrangements accordingly, and on our arrival at the Shoreditch terminus, at eight o’clock on Monday morning, we found that no pains had been spared to prevent anything like crushing or disorder at the doors. The neighbourhood of the station was, as usual, crowded with anxious spectators, who hoped to get a view of the principals in the forthcoming duel; but, so far as Broome was concerned, they were disappointed, as he had proceeded at an early hour to Stratford, where it was arranged the train should stop and pick him up. Paddock, however, accompanied by Jemmy Massey and Alec Keene, was early at the starting-place, and was eagerly greeted by the multitude. From the heavy tariff which had been determined on, we fully expected to find the company not only very select, but far from numerous, and we anticipated that the original number of carriages ordered would have been found
  • 35. sufficient; but such was the rush of the public, that, long before the hour of starting, every carriage was filled, and chiefly by respectable persons. It was soon perceptible that a considerable addition to the conveyances was required, and no less than seven extra carriages were added, all of which filled almost immediately; and, not only so, but very shortly after the special had started a sufficient number of gentlemen arrived at the station to charter another train of some four or five carriages, to follow that containing the belligerents. Among the voyageurs by the first train were almost all the pugilists of note, and an immense number of Corinthians of every grade. In fact, a larger muster of the higher classes we have not seen on such an occasion for many years. There were one or two familiar faces missing, but there were quite sufficient new hands to make up for the deficiency. Among the company was an Indian prince of high rank, and his suite, anxious to obtain a glimpse of the peculiarly national spectacle, and we were delighted to hear that he was treated throughout with the greatest respect, and suffered not the slightest indignity from the thoughtless throng on account of his peculiar appearance or unaccustomed manners; a piece of good behaviour on the part of an unpoliced crowd that was a creditable example to those public gatherings which pretend to superior order and civility. The only
  • 36. complaint we heard on the way down was on the subject of the commissariat, the want of “belly- timber” being universally felt. It turned out that the absence of refreshment among the Corinthians was attributable to the pressure of a certain class at the doors of the station, who, unwilling to pay, and anxious to get a trip for nothing, besieged the doors at the latest moment, in the hope of taking the officials off their guard, and so making a rush for the platform. The formidable appearance of this phalanx induced the police of the line to close the doors and refuse admission to all. Unluckily, amongst the late arrivals, was Mr. Commissary Dismore, who, with his Land Transport Corps, well provided with everything necessary, arrived just too late. Dan himself contrived to get round by a private way on to the platform, but, alas! the “vital ammunition” was cut off. Thanks, however, to the second special, the provisions were brought down in time for the hungry and thirsty souls to refresh themselves after the mill, when due justice was done to Dan’s ample provision. The first special did not leave Shoreditch until a quarter past nine; it reached Stratford about half-past; and here Harry Broome and his friends were picked up. Harry’s mug looked hard and healthy, and about his mouth was a smile of confidence. The universal exclamation was, “How well he looks!” and the short glimpse obtained of him induced many persons to “open” at offers of 7
  • 37. to 4 on him—​ offers which the friends of Paddock were not slow to accept. The train now sped on at a good pace to Chelmsford, where water was taken in, and we again set forward on our journey. At Manningtree, where a second refresher was necessary for the engine, an intimation was received that the “war hawks” were abroad, and that the Ipswich police had, through the indiscretion of some would-be-clever persons, who had gone on over night, obtained a scent of what was intended, and had telegraphed to the police at Diss, in Norfolk, and other places, to be on the look-out. This intimation arrived most opportunely, and it was at once resolved to put on the double, and to bring off the mill as close as possible to Ipswich, where it was least expected. The commander-in-chief mounted the engine, and, under his direction, a likely spot was selected, where the train was brought to a halt, and the assembled multitude, to the number of at least five hundred, dropped upon the field like a flight of crows. Several of the committee of the P.B.A. at once spread themselves about the field in skirmishing order to select the best spot, but while they were so engaged the Commissary and Callas had pitched upon a place which, although not the best, was still tolerably level, and the grass was not very long. Here no time was lost in getting up the fixings. It was uncertain how long the Ipswich “blues” would be
  • 38. hoodwinked, and, therefore, time was everything. A large outer-ring was formed simultaneously with the original circle, and round this the non-paying part of the community quickly ranged themselves. The business of selling inner-ring tickets proceeded briskly, and a sum of £47 was realised thereby, the surplus of which, after paying ring-keepers and the farmer on whose grounds the mill took place for damage to his grass, went to the funds of the Association. So great was the number of privilege ticket-holders that, on sitting down at some distance from the ring, they formed a double row almost the whole way round, and effectually proved their own barrier against the irruption of those who at all times are more free than welcome. It is true that several of the latter class, by some means, obtained access to Broome’s corner later on, where their vociferations were the reverse of agreeable; but, thanks to the exertions of Mike Madden, Bill Barry, and Fred Mason, they were effectually kept within bounds. At length, by a quarter to one, everything was in apple-pie order, and the signal being given, the men at once stepped into the arena; Harry Broome attended by Tass Parker and Tom Sayers, and Paddock under the surveillance of the accomplished Alec Keene and Jemmy Massey. They smiled and shook hands, Harry shaking his nut in a significant manner at Tom, as much as to say, “I’ve got you at last, old fellow.” The
  • 39. colours were now tied to the post, and while the men were preparing their toilet a good deal of betting took place. The first offer was £35 to £20 on Broome —​ a bet which was at once made and staked. 7 to 4 was then laid very freely, the business of booking and staking going on most briskly. Massey now came forward and offered to take £20 to £10, but not being able to get a higher bid than £15 to £10, he closed, and this amount was staked, as was also a similar bet laid to Alec Keene. The layers now began to hang back, and £30 to £20 became the current odds, at which a good deal more business was done. A heavier amount of betting we never remember to have witnessed at the ring-side; and this tended, more than anything else, to show the intense interest the battle excited. At length, offers became more languid, and finally ceased altogether; and as we did not hear of a single bet after the mill commenced, we are inclined to think that the speculators had staked every farthing they brought with them. By one o’clock it was announced that both men were quite ready, and time being called they were led to the scratch, where, after the usual hands across, they were left, peeled to the buff, and their proportions and condition displayed to the curious gaze of the assembled throng.
  • 40. Tom Paddock, as he stood at the scratch, looked every inch a gladiator. Each thew and sinew was perfectly developed, and seemed ready to burst the tightened skin. His broad shoulders and deep chest, covered with ponderous muscles, were the admiration of all; and the distinctness with which his lower ribs were visible proved that there was not an ounce of superfluous flesh on his wiry, powerful frame. His mug was hard and ruddy, and there was clearly little there to swell up should his dial come in too close propinquity to Harry’s sledge-hammers. He looked good-humoured, but determined, and evidently feeling the importance of the occasion, he toed the scratch with a determination to “do or die.” Widely different was the aspect presented by the once powerful Harry Broome. True it was that he had got rid of his superabundant belly, but in doing so it was apparent to all that he had also got rid of much of his muscle and sinew. When he fought Harry Orme he was certainly well covered with fat, but still underneath this coating the evidences of great power were plainly visible; but now, what a falling off was there! Barring the aforesaid protuberance, he was as fat as ever, but all appearances of sinewy strength had vanished. His breasts were soft and puffy, his arms round and smooth, while the flesh on his once fine back hung in collops; there was also a slight eruption on his pale skin, which betokened a feverish
  • 41. state of the blood, which would not have been guessed from the appearance of his face. He said he felt quite well, though not so strong as on former occasions. On inquiring of Joe Bostock, who had been with him while he finished his training at Bosham, near Chichester, we learned that he had several times complained of weakness, and that the more he tried to get his fat off the more did it seem to accumulate. Harry himself informed us, and we are satisfied as to the truth of his statement, that he reduced himself upwards of 3st. in the course of his exercise, but he found himself getting so weak that he was compelled at last to be more gentle in his work; and he now declares his belief that had he gone into the ring in his ordinary state, without any preparation whatever, he would have been better and stronger than he was on Monday. With all his drawbacks, however, he was extremely confident as to the result of the battle, and advised his friends to back him at all hazards. He no doubt depended upon his science, and expected to set at defiance the well- known onslaughts of his opponent. We must now bring these preliminaries to a conclusion, and proceed to our account of THE FIGHT. Round 1.—​ Precisely at six minutes past one the onslaught commenced. Broome, to the astonishment of all, did not
  • 42. assume the elegant attitude we have seen in former battles, but feinted and dodged about without gathering himself together in the least. Tom was evidently surprised, and thought he must be “kidding;” he therefore assumed a defensive position, and bided his time. He had not long to wait. Harry was bent on forcing an opening, and dashed in, feinted with his left, ducked his head, and lodged his left heavily on Tom’s breadbasket. His nut was laid open to a severe upper cut, but Tom, bewildered, did not see, and therefore did not take the advantage of his opening. Broome now came again, let fly his left at the forehead, inflicting no damage, napped a little one on the left brow, and slipped down. 2.—​ Paddock at once rattled in, let go his left with great quickness on the proboscis, drawing first blood. Broome returned on the left cheek, and also elicited a supply of the ruby. Harry then closed, and tried to throw his man, but, after a short struggle, in which Tom was very busy with his right at close quarters, Tom slipped from his grasp and fell. 3.—​ Broome, out of all form, tried to take a lead, but in vain. Paddock was too quick for him, and pegged away heavily left and right on the conk, inflicting a cut on the bridge thereof, drawing more fluid. Broome again closed, and Tom resorted to his fibbing system with both hands heavily on the side of Harry’s nut, and on his ribs. This effectually put a stop to any chance of his being thrown, and in the end both fell side by side. 4.—​ Broome dashed in, let fly his left, which missed; slight exchanges with the same hand followed, and Paddock slipped down. He jumped up immediately to renew the round, but Jemmy Massey squeezed him in his arms as if he were a child, and carried him struggling to his corner.
  • 43. 5.—​ Broome came up puffing, and evidently out of sorts. Paddock, fresh as a daisy, grinned a ghastly grin, and awaited the onslaught. Harry tried his left, when Tom countered him heavily on the snout, drawing more of the crimson. Tom attempted to follow up his advantage, but Harry turned and ran away, Tom after him. On Broome turning round, Tom again planted a little one on the snuff box, and they once more closed, and some infighting took place, in which Broome received heavily on the body, and Tom got a little one behind his left ear. In the end Paddock slipped down. 6.—​ Tom came up smiling. Broome at once rushed in, and closed with his head under Paddock’s arm. Here Tom held it and pegged away at the ribs until both were down, Broome blowing and apparently distressed. The layers of odds even thus early began to look excessively blue at the want of precision of their pet, and his evident lack of lasting powers. 7.—​ Broome slow, tried a feint, when Tom nabbed him with the left on the cheek, and then with the same hand on the snout. Harry at once closed, when Tom, as usual, resorted to his fibbing, at which game Harry joined issue, and each got it on the nose and left cheek. In the end both again down. 8.—​ Tom led off with his left, a straight’un, on the snuff box. Some rambling, scrambling exchanges followed to a close, in which both fell. 9.—​ Tom steadied himself, and let go his left, but Harry countered him heavily on the right cheek. Tom returned on the jaw with his right, and in his hurry to get away slipped down. Harry drew back his hand, as if intending to deliver a spank, but prudently withheld the blow. 10.—​ Broome let go his left, but open-handed, on Tom’s left peeper. Tom returned on the sneezer, increasing the supply of the carmine, and slipped down.
  • 44. 11.—​ Tom feinted, but found Broome ready for a shoot, and stepped back, Harry after him. Tom now let fly his left well on the nose. Harry rushed in to close, and Tom resumed his fibbing on the dial and ribs. In the end he slipped down to avoid the fall. 12.—​ Tom tried his left, but Harry stepped back, and as Tom followed, delivered a heavy right-hander on the mark, and then his left heavily on the mouth, drawing the Falernian, but fracturing one of the small bones of his hand. Paddock at once got down, and Harry walked to his corner. 13.—​ Tom tried his left twice in succession, but Harry jumped away, Tom, however, persevered, and having got another little one on the mouth, went in to close, but on Broome grasping him slipped down. 14.—​ Harry now tried it on, but Tom kept away, and as Harry followed, gave him a touch on the ribs with his left, and getting a little one in return on the chin, dropped. 15.—​ Paddock dashed in without precision, and after a scrambling rally, in which there was more bustle than damage, he got down. 16.—​ Tom once more steadied himself, and let go his left, but Harry cross-countered him on the forehead. Tom now crept close, and feinting with his left, drew Broome out, and then knocked him off his pins by a slashing right-handed cross-counter on the jaw. (First knock-down blow for Paddock.) The cheers of those who had taken the odds were now vociferous. 17.—​ Harry did not seem much the worse for the crack in the last round, but came up good humouredly, and at once dashed to a close. Some sharp infighting took place, followed by a break away. Tom came again, and Harry nailed him very heavily on the snout with his right, staggering him, and
  • 45. drawing a plentiful supply of home-brewed. Paddock quickly sought mother earth. 18.—​ Tom showed a slight mark on the left side of his beak, which was also swollen and bleeding. He rushed in, when Harry caught him on the left cheek, drawing more blood. Tom returned the compliment with interest on the smeller, a very heavy spank, which once more knocked the gallant Harry off his perpendicular. 19.—​ Paddock feinted and let go his left on the nozzle, got a little right-hander on the left cheek in return, and slipped down, grinning. He jumped up, however, and said, “Have another round, Harry.” Harry was ready, but Tom was once more borne off by “the stunted Life Guardsman” (Massey). 20.—​ Tom rattled in again, caught Harry on the nose, just between his eyes, removing more bark, and drawing more claret. Broome returned on the left cheek, and a close followed, in which both pegged away, until Tom fell on his knees, bleeding from his scent-bottle. (Time 28 minutes.) 21.—​ Paddock let go his left once more at Harry’s proboscis, and some rapid but wild exchanges followed, Harry hitting open-handed, and Tom without judgment, and in the end Tom slipped down. 22.—​ Harry came up panting and bleeding from the nose. Tom feinted, and Harry turned away, but Tom, when he got near enough, dashed out with his left very straight and heavy on Harry’s mouth, inflicting a severe cut, and turning on the tap. Harry missed his return, but tried to make a plant upon Tom. It was a failure, however—​ he seemed to have no steam in him—​ and Paddock once more dashed out his left on the mug, increased the wound, and again floored his brave antagonist.
  • 46. 23.—​ Harry, although distressed, attempted to take the lead with his right, his left being apparently useless. He, however, missed a terrific right-hander, and napped a hot one on the nozzle in return. Harry then got in a little one on the jaw, and Tom got down cunning. 24.—​ Paddock led off with his left slightly on the nose, which led to exchanges, Tom again being at home on the snuff box, renewing the stream. He got a right-hander on the left listener, drawing the ruby, and fell. 25.—​ Harry’s mug, on coming up, was much altered for the worse. His mouth was much swollen and cut, and his nasal organ was in not much better condition, while a swelling was perceptible under his left eye. Paddock had few marks of punishment, and was as fresh as ever. Massey offered to lay odds on him, but did not find a response. Paddock made a feint, when Harry turned and ran round the ring, Tom after him. Harry then turned round, and a close took place, in which, after some slight fibbing, Paddock fell, receiving a right-hander on the nut as he reached the ground. (A claim of “foul,” which was not allowed.) 26.—​ Harry sparred a little for wind, and Tom let fly his left, which was stopped. He then closed, and Tom, as usual, pegged away with both hands right merrily, thus preventing any chance of a heavy fall. His blows fell on Harry’s damaged kisser and ribs. In the end Paddock slipped out of Harry’s grasp and fell. 27.—​ The men feinted until they got close, when tremendous right-handed counters were exchanged, Tom getting home on the snout, and Harry on the left cheek, and Paddock down. 28.—​ Tom came up wild, and rushed in, when Broome countered him again heavily on the right peeper. Exchanges
  • 47. Welcome to our website – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading. Let us accompany you on the journey of exploring knowledge and personal growth! ebookultra.com