Professional Documents
Culture Documents
PDF Cyber Defense Mechanisms Security Privacy and Challenges 1St Edition Gautam Kumar Ebook Full Chapter
PDF Cyber Defense Mechanisms Security Privacy and Challenges 1St Edition Gautam Kumar Ebook Full Chapter
https://textbookfull.com/product/biota-grow-2c-gather-2c-cook-
loucas/
https://textbookfull.com/product/security-and-privacy-in-cyber-
physical-systems-first-edition-houbing-song/
https://textbookfull.com/product/adversarial-and-uncertain-
reasoning-for-adaptive-cyber-defense-control-and-game-theoretic-
approaches-to-cyber-security-sushil-jajodia/
https://textbookfull.com/product/mobile-security-and-privacy-
advances-challenges-and-future-research-directions-1st-edition-
man-ho-au/
DIGITAL FORTRESS NAVIGATING CYBER THREATS MASTERING T
ART OF ONLINE SECURITY AND PRIVACY 1st Edition David
Goodlin
https://textbookfull.com/product/digital-fortress-navigating-
cyber-threats-mastering-the-art-of-online-security-and-
privacy-1st-edition-david-goodlin/
https://textbookfull.com/product/challenges-to-internal-security-
of-india-includes-disaster-management-ashok-kumar/
https://textbookfull.com/product/cyber-security-for-cyber-
physical-systems-1st-edition-saqib-ali/
https://textbookfull.com/product/antibiotics-challenges-
mechanisms-opportunities-1st-edition-christopher-walsh/
https://textbookfull.com/product/security-and-privacy-joseph-
savirimuthu/
Cyber Defense
Mechanisms
Artifcial Intelligence (AI): Elementary to
Advanced Practices
Series Editors:
Vijender Kumar Solanki, Zhongyu (Joan) Lu, and Valentina E. Balas
In the emerging smart city technology and industries, the role of artifcial intelli-
gence (AI) is getting more prominent. This AI book series aims to cover the latest AI
work, which will help the naïve user to get support to solve existing problems and for
the experienced AI practitioners, and assists to shedding light for new avenues in the
AI domains. It covers the recent work carried out in AI and its associated domains,
logics, pattern recognition, NLP, expert systems, machine learning, blockchain, and
Big Data. The work domain of AI is quite deep, so this book discusses the latest
trends which are evolving with the concepts of AI and helps practitioners, students,
researchers, and those who are new to this feld to gain some new insights.
Edited by
Gautam Kumar, Dinesh Kumar Saini, and
Nguyen Ha Huy Cuong
First edition published 2021
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
Reasonable eforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of
their use. Te authors and publishers have attempted to trace the copyright holders of all material
reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and
let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microflming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.
com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA
01923, 978-750-8400. For works that are not available on CCC please contact mpkbookspermissions@
tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identifcation and explanation without intent to infringe.
Typeset in Times
by codeMantra
Contents
Preface......................................................................................................................vii
Editors.......................................................................................................................ix
Contributors ..............................................................................................................xi
Chapter 8 Big Data Analysis on Smart Tools and Techniques ......................... 111
Jabar H. Yousif and Dinesh Kumar Saini
v
vi Contents
Index...................................................................................................................... 213
Preface
Security and privacy is one of most crucial, in this digital age, for all of us in daily
human being life. To deal the same with tools and technologies is one of the big chal-
lenges, because so many attacks are reported in all kinds of computer systems and
networks. It is becoming increasingly important to develop robust, adaptive, scal-
able, and reliable security and privacy mechanisms for applications and its related
areas. In relation to the same, it is imperative to understand the fundamentals with
recent attacks such as cyber security principles, vulnerabilities, and handful and
optimized solutions used as defense mechanisms. The security mechanisms are pre-
sented to mitigate negative implications associated with cyberattacks and privacy
issues in various technologies. The objective of this book is to collect and address
a variety of problems in relation to cyberdefense mechanisms, because in the fast
growing environment, the research trends in this area are always having a great
demand in the form of prospective cyberdefense cryptographers and most to car-
rier buildings. The contributors are addressing theoretical and practical aspects to
security mechanisms, challenges, and opportunities. This book aims is to attract
graduates/postgraduates/researchers/practitioners who are working in computer
science and information technology.
The overall objectives covered are as follows:
vii
Editors
Dr. Gautam Kumar is currently working as Associate
Professor at CMR Engineering College, Hyderabad, India.
He received his PhD degree in computer science and engi-
neering from Jaypee University of Information Technology,
Himachal Pradesh, India, in 2017. He did his M.Tech in
Rajasthan Technical University, Kota, India, in 2012, and
B.E. in Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal,
India, in 2005. He has the academic experience more than
14+ years. His research interests are in the feld of cryptogra-
phy, information security, design and analysis of algorithms.
He has published more than 25 research journals and conferences papers of repute
in Science Citation, Scopus, and indexed journals and conferences. He has handled
various responsibilities as a president of Institute’s Innovation Council, Ministry of
Human Resource Development (MHRD), India, and a Convenor/SPOC of Smart-India
Hackathon, New Delhi, India. He is a reviewer of (i) Security and Communication
Networks, John Wiley & Sons and Hindawi, (ii) The Computer Journal, Oxford
Academic, and many reputes of IEEE/ACM international conferences.
ix
Contributors
Amna Al-Sdidi Suman De
Faculty of Computing and Information Developer
Technology SAP Labs India Pvt. Ltd.
Sohar University Bangalore, Karnataka, India
Sohar, Oman
Mohammad Farhan Ferdous
K. Annapurna Department of Information Science
Department of Computer Science & Japan Advanced Institute of Science
Engineering and Technology
Canara Engineering College (Affliated Ishikawa, Japan
to VTU, Belagavi, India) Japan-Bangladesh Robotics &
Benjanapadavu, Mangalore, India Advanced Technology Research
Center (JBRATRC)
D. Arivudainambi Dhaka, Bangladesh
Department of Mathematics
Anna University Anuj Kumar Goel
Chennai, Tamil Nadu, India Department of Electronics &
Communication Engineering
Shreyas Arunesh CMR Engineering College
Department of Electronics and Hyderabad, Telangana, India
Communication
NMAMIT (Autonomous and Affliated Meenu Gupta
to VTU, Belagavi) Department of Computer Science and
Karkala, Karnataka, India Engineering
Chandigarh University
K. Pranava Bhat Chandigarh, Punjab, India
Department of Electronics and
Communication Rachna Jain
NMAMIT (Autonomous and Affliated Department of Computer Science and
to VTU, Belagavi) Engineering
Karkala, Karnataka, India Bharati Vidyapeeth’s College of
Engineering
Ashok Kumar Das Delhi, India
Center for Security, Theory and
Algorithmic Research Gautam Kumar
International Institute of Information Department of Computer Science and
Technology Engineering
Hyderabad, Telangana, India CMR Engineering College
Hyderabad, Telangana, India
xi
xii Contributors
CONTENTS
1.1 Introduction ......................................................................................................2
1.2 History of Security Breaches............................................................................3
1.3 Common Security Threats................................................................................4
1.3.1 Malware ................................................................................................4
1.3.2 Phishing ................................................................................................5
1.3.3 Spear Phishing ......................................................................................5
1.3.4 “Man in the Middle” (MitM) Attack....................................................5
1.3.5 Trojans ..................................................................................................5
1.3.6 Ransomware .........................................................................................6
1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service
Attack (DDoS) ......................................................................................6
1.3.8 Attacks on IoT Devices.........................................................................6
1.3.9 Data Breaches .......................................................................................6
1.3.10 Malware on Mobile Apps .....................................................................6
1.4 Security Challenges in Modern Day ................................................................7
1.4.1 Cloud Computing..................................................................................7
1.4.2 Social Media .........................................................................................8
1.4.3 Smart Phones ........................................................................................8
1.4.4 General Data Protection Regulations (GDPR) .....................................9
1.4.5 Attacks Based on Machine Learning and AI .......................................9
1.4.6 Attacks against Cryptocurrencies and Blockchain Systems .............. 10
1.4.7 Switching to DevOps.......................................................................... 10
1.4.8 Biometric Authentication.................................................................... 11
1.4.9 Fileless Malware ................................................................................. 11
1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT)..... 12
1.5.1 How an APT Attack Works................................................................ 12
1.5.2 Some Instances of APTs..................................................................... 13
1.5.3 Characteristics of APTs ...................................................................... 14
1.6 Prevention Measures....................................................................................... 15
1.6.1 Identify the Threats ............................................................................ 15
1
2 Cyber Defense Mechanisms
1.1 INTRODUCTION
Cybersecurity has become a matter of primary concern for organizations and world
governments alike. The essence of every application is ranging from web-based
offerings to mobile applications run into the common challenge of defending against
intrusions by foreign attacks of cybercriminals. Data security provides another angle
to the all security practices, and the governed aspects of policies like General Data
Protection Regulations (GDPR) make it essential to software vendors to abide the
needs of relevant governing laws and ensure quality with respect to security. This
introduces the importance of incorporating security analysts to evaluate and ensure
that the required guidelines and regulations are maintained wherever required. This
chapter takes a tour of generic security threats and how the role of a security analyst
helps discover potential threats and faws in any software offering. The recent secu-
rity threats are also explored and briefy discussed along with the possible prevention
steps against known attack strategies.
Threat analysis is the process of evaluating suspicious actions and reach of
unrecognized intelligence bodies or cybercriminals [1]. A cybersecurity threat is
described as a malicious activity that looks to hamper the digital world. The activity
could be damaging of data, intervention in a communication channel, or unauthor-
ized retrieval of data. The generic target of hackers* includes business organiza-
tions, government bodies, institutions, and even individuals with infuential identity.
Cyberattacks can involve threats such as denial-of-service (DoS), malwares, software
viruses, and phishing emails. These threats target entities with an online presence
and relevance with respect to the attack. History has shown cyberattacks that have
resulted in breaches of Government security missions, data breach in media houses,
and massive fund transfers in bank frauds affecting regular activities of human life.
Security threats can be damaging but often follow well-defned strategic moves,
which leads to a possible breach. The prevention of attack scenarios is well estab-
lished by a study of possible attack strategies and the necessary steps that are needed
* Hackers (indicative to crackers) are individuals who break into a system to gain unauthorized access
to confdential data or to affect the regular functionality of a system.
Security Threat Analysis and Prevention 3
TABLE 1.1
List of Well-Known Cyberattacks or Breaches
Incident Type of Attack Year
WannaCry Ransomware Malware software demanding ransom 2017
Koobface worm Malware in social media sites—213K users affected 2009
Equifax Data breach affecting 145.5 million users 2017
Dream market breach Sixteen websites hacked and out on sale in the Dark web 2019
Friend Finder networks 412 Million accounts hacked and exposed 2016
4 Cyber Defense Mechanisms
FIGURE 1.1 Cyberattack frequency on fnancial institutions since 2007 as per Carnegie
Endowment.
1.3.1 MALWARE
Malware is an application which does a harmful activity on a device, network, or
system. Activities can result to corruption of data, gaining unauthorized access on
confdential information or manipulation of data. The word “malware” is formed
keeping the essence of two different words “malicious” and “software.” A malware
can be a virus, Trojan, spyware, or ransomware that causes damage to a system.
Viruses tend to associate itself with other entities to clear fle content, or infect and
damage relevant fle content. Viruses spread with control, resulting in damage of a
system’s primary features, and damaging or corrupting fle content. Such software
appears as executables (.exe) or batches (.bat), and cause harm to the system. Trojans
are malwares that disguise itself as legitimate software or are hidden in legitimate
software that has been tampered with. It acts discretely by making backdoors in the
security system to allow signifcant malwares inside. Spywares are malicious soft-
ware which are developed to spy on users. They hide themselves in the background
and observe the user’s online activities, including passwords, credit card numbers,
user behavior for websites, and other relevant activities. The primary objective of
Worms is to infect a complete network of devices, both local and across the web, via
network protocols, or interfaces. Ransomware attempts to lock down systems and
relevant fle content and sends a word to erase or damage signifcant data unless a
ransom is paid. Another type of malware is Adware which is not harmful but causes
a distraction for users and also creates an easier route for other malwares to creep
Security Threat Analysis and Prevention 5
into the system. Attackers can also utilize a network of computer to infect and work
for personal benefts which is also another type of malware and is commonly known
as Botnet.
1.3.2 PHISHING
Phishing is a message-based (especially electronic mails) threat which constitutes
of tricking the end-user into exposing private data or luring to download malicious
software by following a link sent with the email. The email is drafted in a way to
make the recipient believe the source and trust the sending entity. Once the recipi-
ent is lured into the content, they are coaxed into providing private information or
forced to download malware onto the target’s computer. A common example is a
mail containing prize winning notifcation and requesting bank details for follow-up
on receiving the winnings.
1.3.5 TROJANS
They are a form of malicious software which reaches a network appearing to be a
generic software but installs malicious code after it is inside the target system. It
draws motivation from ancient Greek History and was named after the same. Trojans
are employed by cybercriminals and intruders to attain unauthorized access to net-
works. End-users are tricked through social engineering techniques into download-
ing and installing Trojans. Once installed, Trojans enable cyberthieves to spy, steal
confdential data, and gain unauthorized access to the target system. The activities
involve data deletion, blockage, modifcation, copy, and affecting the performance of
systems or network of computers.
6 Cyber Defense Mechanisms
1.3.6 RANSOMWARE
Ransomware is a malware that constitutes of encryption of information on the
host network and asking for money in return of availability of the system to the
affected individual again. This type of a threat may involve low-hanging nuisances
to major incidents as observed during the locking of confdential government
information for the whole area of Atlanta and WannaCry ransomware software in
2018 and 2017, respectively.
„De pastor kreeg een gedacht. Koster! riep hij, ’k en kan [75]ik volstrekt in
de kerke niet gaan, ge zult gij moeten de kruiskes geven.
„De koster, die zijnen pastor gewend was, verstond dat nog al wel.
„Ge weet wat ge moet zeggen, binst dat ge de kruiskes geeft: Memento,
homo! quia pulvis es et in pulverum reverteris (Herinner, mensch! dat gij
stof zijt en in stof zult wederkeeren).
„De pastor herhaalde ’t latijn, maar de koster en verstond het nog niet.
„Ja, Mijnheer Pastor, zei de koster, en hij trok de kerke binnen, peinzende
in zijn eigen dat ze toch aardige dingen zeggen aan de menschen in ’t
latijn.
„En hij begon maar kruiskes te geven en te herhalen dat hij schuimde:
„De menschen keken wat aardig en dat wierd beklapt en besproken als zij
buiten de kerke kwamen.
„Onverdiend!”
Hier voren (op bladzijde 70) heb ik reeds met een enkel woord
vermeld de verzen van eenen Vlaming uit den ouden tijd, waarin al
de spotnamen van Vlaamsche steden en dorpen zijn opgenoemd.
Op dat hoogst merkwaardige stuk wil ik hier nader terug komen.
Sommigen van deze oude namen leven nog heden in den mond des
volks. De H e e r e n van Gent, de K i n d e r e n van Yperen, de
P a s t e i - e t e r s van Kortrijk, de M a k e l - e t e r s van
Dendermonde, de W i t v o e t e n van Aalst, en anderen zijn nog
heden ten dage zoo goed bekend als tijdens Eduwaert den Dene.
Daarentegen zijn de rijke en machtige P o o r t e r s van Brugge uit
de zestiende eeuw in onze negentiende eeuw tot Z o t t e n
vernederd, zijn de oude L e d i g g a n g e r s van Oudenaarde thans
B o o n e n k n o o p e r s , de H u i d e v e t t e r s van Geeraartsbergen
thans B e r g k r u i p e r s , de K a n d e e l e t e r s van Meenen thans
Ta a r t e b a k k e r s , de R o o m e t e r s van Moerbeke thans
S m e e r k o e k e t e r s (de hedendaagsche lieden van Meenen en
van Moerbeke zijn toch liefhebbers van lekkernij gebleven, zoo als
hunne oud-eeuwsche voorvaders reeds waren); de
V a c h t p l u k k e r s van Poperinge heeten thans K e i k o p p e n , de
O v e r m o e d i g e n van Ronse zijn tot Z o t t e n ,
V l i e g e n v a n g e r s en S l e k k e n t r e k k e r s geworden, en de
zestiende-eeuwsche B u e t e r - e t e r s van Diksmude thans, min
hoffelijk, tot B o t e r - k o p p e n .
Uit een taalkundig oogpunt zijn eenigen van deze namen zeer
merkwaardig; b.v. de D a r y n c b a r n e r s van ’t Land van den Vrijen
van Brugge (eene gouw in ’t Noorden van West-Vlaanderen), die in ’t
hedendaagsche Hollandsche Nederduitsch T u r f b r a n d e r s
zouden moeten genoemd worden. Darync, Darink, Daring,
hedendaags in West-Vlaanderen als dèring of derring uitgesproken,
is de oorspronkelijke vorm van ons hedendaagsch Noord-
Nederlandsche woord derrie.—Verder de H u d e v e t t e r s
(Lederbereiders) van Geeraartsbergen, de D r o o g h a e r t s
(Droogscheerders) van Werveke, de T h o o l n a e r s (Tollenaars of,
zoo als de verbasterde Hollanders zeggen, „Douanen”) van
Rupelmonde, enz.
Daar zijn nog oudere Vlaamsche spotnamen bekend, dan dezen van
1560. In de Anzeiger für Kunde der Teutschen Vorzeit, jaargang
1835, bladzijde 299 vindt men een lijstje van die namen
medegedeeld, ’t welk volgens de meening van sommige geleerden
tusschen de jaren 1347 en 1414 moet zijn opgesteld. Deze
middeleeuwsche spotnamen zijn in hoofdzaak de zelfden als die
men in „den langhen Adieu” vindt opgesomd. Sommigen echter
wijken in meerdere of mindere mate af van de namen in dat [81]rijm
voorkomende. Zoo heeten in dit middeleeuwsche lijstje de
ingezetenen van Poperingen V a c h t p l o t e r s , terwijl Eduwaert
de Dene ze V a c h t p l u c k e r s noemt; die van Meenen
P e l s m a k e r s , tegenover de C a n d e e l e t e r s van de Dene; die
van Werveke V e r w a t e n l i e d e n , tegenover de
D r o o g h a e r t s van de Dene; die van Deinse G a r e n c o e p e r s
tegenover de C a e r d e m a e c k e r s van de Dene. En er worden in
het oude lijstje ook eenigen genoemd, die de Dene niet heeft; bij
voorbeeld de W a f e l e t e r s van Bethune, de U t r e c h t s c h e
V l a m i n g e n van de Vier-Ambachten, de P l a t t e G e s e l l e n
van Sleedingen (hedendaags Sleidinge), de D a n s e r s van
Everghem, de S c i p h e e r e n van der Sluus, de T u u s c h e r s van
Theemsche (hedendaags Temseke), en anderen.
De Engelschman J o h n B u l l , de Franschman J e a n
P o t a g e e n zijn wijf M a r i a n n e , J a n t j e - K a a s de Hollander
(door Vlamingen en Brabanders zoo genoemd) en de Duitsche
M i c h e l of H a n s - M i c h e l zijn overbekend. Overbekend is ook in
onze dagen de spotnaam R o o i n e k en R o o i b a a i t j i e , dien
onze Zuid-Afrikaansche stamgenooten den Engelschman geven. De
Hollanders in ’t bijzonder hebben ook nog eenen bijzonderen
spotnaam voor den Duitscher, dien ze M o f noemen. Naar den
oorsprong van dezen naam is door velen vruchteloos gezocht.
Opmerkelijk is het dat de Duitschers, die langs onze oostelijke
grenzen wonen, dien spotnaam M o f (zij zeggen M u f ) wederkeerig
op de Nederlanders toepassen, en ons H o l l a n d e r - M u f
noemen; zie Ten Doornkaat Koolman, Wörterbuch der
Ostfriesischen Sprache, waar almede eene verklaring van dit woord
Muf of Mof te vinden is. De Nederlanders noemen geheel
Duitschland wel M o f f r i k a , maar de Duitschers zelven geven dien
naam M u f f r i k a in ’t bijzonder aan eene kleine gouw, langs onze
grenzen zich uitstrekkende, aan het zoogenoemde Nedersticht van
Munster, tusschen Oost-Friesland en Bentheim gelegen, en de
stadjes Meppen en Lingen met omstreken omvattende.
Opmerkelijk is het, dat men dit woord P o e p als spotnaam ook hier
en daar elders in de Nederlanden terug vindt. De ingezetenen van
Deventer toch dragen bij de andere Overijsselaars en bij de
Gelderschen in hunne nabuurschap ook dezen naam. En ook de
Zeeuwen noemen hunne Vlaamsche en Brabantsche naburen
P o e p e n . Zoo hoorde ik in 1869 door een paar burgers van Goes
zeggen, van een gezelschap boeren en boerinnen uit de polders van
Zandvliet bij Antwerpen, die door ’t stadje Goes ronddwaalden: „’t
zijn maar P o e p e n ,” eenigszins minachtender wijze, juist zoo als
de Friezen spreken van de Duitschers. Volgens van Dale (zelf een
Zeeuwsche Vlaming), Nieuw Woordenboek der Nederlandsche taal,
is p o e p een scheldnaam dien de bewoners van Zuid-Beveland aan
de bewoners van Zeeuwsch-Vlaanderen geven. En volgens De Bo’s
Westvlaamsch Idioticon noemt men in West-Vlaanderen „iemand die
weinig verstand of weinig moed heeft,” een „dwazerik” dus, of een
„lafaard”, een „p o e p g a a i .”
In der daad, de stad Dokkum dagteekent reeds uit zeer ouden tijd;
reeds ten jare 754 verkondigde Sint-Bonifacius daar het Evangelie.
Het Dokkumer taai, eene soort van grof Sint-Nicolaasgebak, is in
geheel Friesland vermaard. En wat de Dokkumer garnaten
(garnalen) aangaat, daar moet men maar niet te luide van spreken,
als er Dokkumers bij zijn (zie bladzijde 21 en vervolgens). [87]
Zeer aardig kenschetsend zijn deze twee rijmkes, van een
Utrechtsch en van een Noordbrabantsch dorp:
Neêr-Langbroek,
Die schrale hoek!
Daar wonen niets dan edellui
En bedellui,
Ridders
En broodbidders;
Daar staan anders niet als kasteelen en nesten,
Sterkenburg is het beste.
Loon-op-Zand,
Licht volk, licht land;
Ze schooien den kost.
En ze stelen den brand. 16
De Bressianen
Zijn hanen,
Maar voor Schoondijke
Moeten ze wijken,
En komen die van de Groe,
Dan houden ze beter hun deuren maar toe!
[88]
Van groote ingenomenheid met zich zelven getuigt het volgende rijm
van sommige Noordhollandsche steden, dat bij de
Monnikendammers in zwang is:
Ten slotte kan ik nog een zeer bijzonder rijm hier mede deelen, dat
betrekking heeft op de Friesche eilandenreeks die zich uitstrekt
tusschen de Weser en het Marsdiep, en dat door mij is
opgeschreven uit den mond van eenen Frieschen schipperszoon,
die met de tjalk van zijnen vader wel oostwaarts naar Emden,
Bremen en Hamburg, en wel zuidwaarts naar Amsterdam,
Rotterdam, Dordrecht en Antwerpen voer. Het rijm is niet in de
eigenlijke Friesche taal opgesteld, maar in het zoogenoemde Stad-
Friesch of „Stêdsk”, dat is Oud-Dietsch met Friesche woorden en
woordvormen vermengd, en met eenen Frieschen mond
uitgesproken.
Wrangero de skoone,
Spikeroog de krone,
Langeroog is ’n butterfat
En Baltrum is ’n sangat.
En de Norderneyers frete har mar half sat
Juust dat is ’n rooverland;
En Borkum is ’n tooverland;
Rottumeroog is ’n klein land,
Mar Skiermonnikoog is sterk bemand:
De Amelander skalken
Hewwe stolen drie balken,
Avons in ’e maneskijn,
Daarom sal ’t har wapen sijn. [89]
Skilingen het ’n hooge toren,
Flielan het siin naam ferloren,
Tessel is mar ’n seegat,
De Helderse T r a a n b o k k e n segge dat.
Dit is het einde van mijn opstel over spotnamen, spotrijmen, enz.
Mogen anderen hierin aanleiding vinden dit belangrijke onderwerp
nog eens beter en uitvoeriger te behandelen. [90]
[Inhoud]