Instant Download Big Data Analytics in Cybersecurity First Edition Deng PDF All Chapters
Instant Download Big Data Analytics in Cybersecurity First Edition Deng PDF All Chapters
com
https://textbookfull.com/product/big-data-analytics-in-
cybersecurity-first-edition-deng/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/leadership-strategies-in-the-age-of-
big-data-algorithms-and-analytics-first-edition-norton-paley/
textboxfull.com
https://textbookfull.com/product/from-big-data-to-big-profits-success-
with-data-and-analytics-1st-edition-russell-walker/
textboxfull.com
https://textbookfull.com/product/big-data-analytics-systems-
algorithms-applications-c-s-r-prabhu/
textboxfull.com
https://textbookfull.com/product/big-data-and-analytics-for-
insurers-1st-edition-boobier/
textboxfull.com
Big Data Analytics with Java 1st Edition Rajat Mehta
https://textbookfull.com/product/big-data-analytics-with-java-1st-
edition-rajat-mehta/
textboxfull.com
https://textbookfull.com/product/big-data-analytics-for-large-scale-
multimedia-search-stefanos-vrochidis/
textboxfull.com
https://textbookfull.com/product/big-data-analytics-for-intelligent-
healthcare-management-1st-edition-nilanjan-dey/
textboxfull.com
https://textbookfull.com/product/understanding-azure-data-factory-
operationalizing-big-data-and-advanced-analytics-solutions-sudhir-
rawat/
textboxfull.com
Big Data Analytics
in Cybersecurity
Data Analytics Applications
Series Editor: Jay Liebowitz
PUBLISHED
FORTHCOMING
Edited by
Onur Savas
Julia Deng
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize
to copyright holders if permission to publish in this form has not been obtained. If any copyright material
has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans-
mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright
.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the
CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Preface................................................................................................................vii
About the Editors..............................................................................................xiii
Contributors....................................................................................................... xv
6 Cybersecurity Training.......................................................................115
BOB POKORNY
v
vi ◾ Contents
Index............................................................................................................329
Preface
vii
viii ◾ Preface
that the organization expects staff to apply; (2) assuming that new cybersecurity
staff who recently received degrees or certificates in cybersecurity will know what is
required; or (3) requiring cybersecurity personnel to read about new threats.
Chapter 7, “Machine Unlearning: Repairing Learning Models in Adversarial
Environments,” is written by Professor Yinzhi Cao of Lehigh University. Motivated
by the fact that today’s systems produce a rapidly exploding amount of data, and
the data further derives more data, this forms a complex data propagation network
that we call the data’s lineage. There are many reasons that users want systems to
forget certain data including its lineage for privacy, security, and usability reasons.
In this chapter, the author introduces a new concept machine unlearning, or simply
unlearning, capable of forgetting certain data and their lineages in learning models
completely and quickly. The chapter presents a general, efficient unlearning approach
by transforming learning algorithms used by a system into a summation form.
Chapter 8, “Big Data Analytics for Mobile App Security,” is written by
Professor Doina Caragea of Kansas State University, and Professor Xinming Ou of
the University of South Florida. This chapter describes mobile app security analysis,
one of the new emerging cybersecurity issues with rapidly increasing requirements
introduced by the predominant use of mobile devices in people’s daily lives, and dis-
cusses how big data techniques such as machine learning (ML) can be leveraged for
analyzing mobile applications such as Android for security problems, in particular
malware detection. This chapter also demonstrates the impact of some challenges
on some existing machine learning-based approaches, and is particularly written to
encourage the practice of employing a better evaluation strategy and better designs
of future machine learning-based approaches for Android malware detection.
Chapter 9, “Security, Privacy, and Trust in Cloud Computing,” is written by
Ruiwen Li, Songjie Cai, and Professor Yuhong Liu Ruiwen Li, and Songjie Cai of
Santa Clara University, and Professor Yan (Lindsay) Sun of the University of Rhode
Island. Cloud computing is revolutionizing the cyberspace by enabling conve-
nient, on-demand network access to a large shared pool of configurable computing
resources (e.g., networks, servers, storage, applications, and services) that can be rap-
idly provisioned and released. While cloud computing is gaining popularity, diverse
security, privacy, and trust issues are emerging, which hinders the rapid adoption of
this new computing paradigm. This chapter introduces important concepts, mod-
els, key technologies, and unique characteristics of cloud computing, which helps
readers better understand the fundamental reasons for current security, privacy, and
trust issues in cloud computing. Furthermore, critical security, privacy and trust
challenges, and the corresponding state-of-the-art solutions are categorized and dis-
cussed in detail, and followed by future research directions.
Chapter 10, “Cybersecurity in Internet of Things (IoT),” is written by Wenlin Han
and Professor Yang Xiao of the University of Alabama. This chapter introduces the
IoT as one of the most rapidly expanding cybersecurity domains, and presents the
big data challenges faced by IoT, as well as various security requirements and issues
in IoT. IoT is a giant network containing various applications and systems with
Preface ◾ xi
heterogeneous devices, data sources, protocols, data formats, and so on. Thus, the
data in IoT is extremely heterogeneous and big, and this poses heterogeneous big data
security and management problems. This chapter describes current solutions and also
outlines how big data analytics can address security issues in IoT when facing big data.
Chapter 11, “Big Data Analytics for Security in Fog Computing,” is written by
Shanhe Yi and Professor Qun Li of the College of William and Mary. Fog comput-
ing is a new computing paradigm that can provide elastic resources at the edge of
the Internet to enable many new applications and services. This chapter discusses
how big data analytics can come out of the cloud and into the fog, and how security
problems in fog computing can be solved using big data analytics. The chapter also
discusses the challenges and potential solutions of each problem and highlights
some opportunities by surveying existing work in fog computing.
Chapter 12, “Analyzing Deviant Socio-Technical Behaviors using Social
Network Analysis and Cyber Forensics-Based Methodologies,” is written by Samer
Al-khateeb, Muhammad Hussain, and Professor Nitin Agarwal of the University
of Arkansas at Little Rock. In today’s information technology age, our thinking
and behaviors are highly influenced by what we see online. However, misinfor-
mation is rampant. Deviant groups use social media (e.g., Facebook) to coordi-
nate cyber campaigns to achieve strategic goals, influence mass thinking, and steer
behaviors or perspectives about an event. The chapter employs computational social
network analysis and cyber forensics informed methodologies to study information
competitors who seek to take the initiative and the strategic message away from the
main event in order to further their own agenda (via misleading, deception, etc.).
Chapter 13, “Security Tools for Cybersecurity,” is written by Matthew Matchen
of Braxton-Grant Technologies. This chapter takes a purely practical approach to
cybersecurity. When people are prepared to apply cybersecurity ideas and theory to
practical applications in the real world, they equip themselves with tools to better
enable the successful outcome of their efforts. However, choosing the right tools
has always been a challenge. The focus of this chapter is to identify functional areas
in which cybersecurity tools are available and to list examples in each area to dem-
onstrate how tools are better suited to provide insight in one area over the other.
Chapter 14, “Data and Research Initiatives for Cybersecurity,” is written by the
editors of this book. We have been motivated by the fact that big data based cyber-
security analytics is a data-centric approach. Its ultimate goal is to utilize available
technology solutions to make sense of the wealth of relevant cyber data and turn-
ing it into actionable insights that can be used to improve the current practices
of network operators and administrators. Hence, this chapter aims at introducing
relevant data sources for cybersecurity analysis, such as benchmark datasets for
cybersecurity evaluation and testing, and certain research repositories where real
world cybersecurity datasets, tools, models, and methodologies can be found to
support research and development among cybersecurity researchers. In addition,
some insights are added for the future directions on data sharing for big data based
cybersecurity analysis.
http://taylorandfrancis.com
About the Editors
Dr. Onur Savas is a data scientist at Intelligent Automation, Inc. (IAI), Rockville,
MD. As a data scientist, he performs research and development (R&D), leads a
team of data scientists, software engineers, and programmers, and contributes to
IAI’s increasing portfolio of products. He has more than 10 years of R&D expertise
in the areas of networks and security, social media, distributed algorithms, sen-
sors, and statistics. His recent work focuses on all aspects of big data analytics and
cloud computing with applications to network management, cybersecurity, and
social networks. Dr. Savas has a PhD in electrical and computer engineering from
Boston University, Boston, MA, and is the author of numerous publications in
leading journals and conferences. At IAI, he has been the recipient of various R&D
contracts from DARPA, ONR, ARL, AFRL, CTTSO, NASA, and other federal
agencies. His work at IAI has contributed to the development and commercializa-
tion of IAI’s social media analytics tool Scraawl® (www.scraawl.com).
Dr. Julia Deng is a principal scientist and Sr. Director of Network and Security
Group at Intelligent Automation, Inc. (IAI), Rockville, MD. She leads a team of
more than 40 scientists and engineers, and during her tenure at IAI, she has been
instrumental in growing IAI’s research portfolio in networks and cybersecurity. In
her role as a principal investigator and principal scientist, she initiated and directed
numerous R&D programs in the areas of airborne networks, cybersecurity, net-
work management, wireless networks, trusted computing, embedded system, cog-
nitive radio networks, big data analytics, and cloud computing. Dr. Deng has a
PhD from the University of Cincinnati, Cincinnati, OH, and has published over
30 papers in leading international journals and conference proceedings.
xiii
http://taylorandfrancis.com
Contributors
Yi Cheng Qun Li
Intelligent Automation, Inc. College of William and Mary
Rockville, Maryland Williamsburg, Virginia
xv
xvi ◾ Contributors
Bob Pokorny
Intelligent Automation, Inc.
Rockville, Maryland
APPLYING BIG I
DATA INTO
DIFFERENT
CYBERSECURITY
ASPECTS
http://taylorandfrancis.com
Chapter 1
Contents
1.1 Introduction to Big Data Analytics...............................................................4
1.1.1 What Is Big Data Analytics?..............................................................4
1.1.2 Differences between Traditional Analytics and Big Data Analytics....4
1.1.2.1 Distributed Storage..............................................................5
1.1.2.2 Support for Unstructured Data............................................5
1.1.2.3 Fast Data Processing............................................................6
1.1.3 Big Data Ecosystem...........................................................................7
1.2 The Need for Big Data Analytics in Cybersecurity........................................8
1.2.1 Limitations of Traditional Security Mechanisms...............................9
1.2.2 The Evolving Threat Landscape Requires New Security
Approaches......................................................................................10
1.2.3 Big Data Analytics Offers New Opportunities to Cybersecurity......11
1.3 Applying Big Data Analytics in Cybersecurity............................................11
1.3.1 The Category of Current Solutions..................................................11
1.3.2 Big Data Security Analytics Architecture........................................12
1.3.3 Use Cases.........................................................................................13
1.3.3.1 Data Retention/Access.......................................................13
1.3.3.2 Context Enrichment..........................................................14
1.3.3.3 Anomaly Detection...........................................................15
1.4 Challenges to Big Data Analytics for Cybersecurity....................................18
References............................................................................................................20
3
4 ◾ Big Data Analytics in Cybersecurity
This chapter introduces big data analytics and highlights the needs and importance
of applying big data analytics in cybersecurity to fight against the evolving threat
landscape. It also describes the typical usage of big data security analytics including
its solution domains, architecture, typical use cases, and the challenges. Big data
analytics, as an emerging analytical technology, offers the capability to collect,
store, process, and visualize big data, which are so large or complex that traditional
data processing applications are inadequate to deal with them. Cybersecurity, at
the same time, is experiencing the big data challenge due to the rapidly growing
complexity of networks (e.g., virtualization, smart devices, wireless connections,
Internet of Things, etc.) and increasing sophisticated threats (e.g., malware, multi-
stage, advanced persistent threats [APTs], etc.). Accordingly, traditional cybersecu-
rity tools become ineffective and inadequate in addressing these challenges and big
data analytics technology brings in its advantages, and applying big data analytics
in cybersecurity becomes critical and a new trend.
of big data that need to be updated frequently or even continually. Big data analyt-
ics is able to deal with them well by applying distributed storage and distributed
in-memory processing.
1.1.2.1 Distributed Storage
“Volume” is the first “V” of Gartner’s definition of big data. One key feature of big
data is that it usually relies on distributed storage systems because the data is
so massive (often at the petabyte or higher level) that it is impossible for a single
node to store or process it. Big data also requires the storage system to scale up with
future growth. Hyperscale computing environments, used by major big data com-
panies such as Google, Facebook, and Apple, satisfy big data’s storage requirements
by constructing from a vast number of commodity servers with direct-attached
storage (DAS).
Many big data practitioners build their hyberscale computing environments
using Hadoop [2] clusters. Initiated by Google, Apache Hadoop is an open-source
software framework for distributed storage and distributed processing of very large
data sets on computer clusters built from commodity hardware. There are two key
components in Hadoop:
◾◾ HDFS (Hadoop distributed file system): a distributed file system that stores
data across multiple nodes
◾◾ MapReduce: a programming model that processes data in parallel across
multiple nodes
Under MapReduce, queries are split and distributed across parallel nodes and
processed in parallel (the Map step). The results are then gathered and delivered (the
Reduce step). This approach takes advantage of data locality—nodes manipulating
the data they have access to—to allow the dataset to be processed faster and more
efficiently than it would be in conventional supercomputer architecture [3].
◾◾ Infrastructure
Infrastructure is the fundamental part of the big data technology. It stores,
processes, and sometimes analyzes data. As discussed earlier, big data infra-
structure is capable of handling both structured and unstructured data at
large volumes and fast speed. It supports a vast variety of data, and makes it
possible to run applications on systems with thousands of nodes, potentially
Cross-infrastructure/analytics
Open source
Last updated 3/23/2016 Matt Turck (@mattturck), Jim Hao (@jimrhao), and FirstMark Capital (@firstmarkcap)
◾◾ A basic data storage platform to support long-term log data retention and
batch processing jobs. There are a few offerings in the market that skip this
layer and use a single NoSQL database to support all the data retention,
investigation access, and analytics. However, considering all the available
open-source applications in the Hadoop ecosystem, a Hadoop-based plat-
form still gives a more economical, reliable, and flexible data solution for
larger data sets.
◾◾ A data access layer with fast query response performance to support inves-
tigation queries and drill-downs. Because the data access inside Hadoop
Services/apps
Data presentation
Integration
consumption
Data access
Data
Data storage
russian polony.
Your success in this undertaking chiefly depends upon the choice
of the meats made use of. Take of
The lean of Belfast smoked hams, 1 year old 3 lb.
The fat of Belfast smoked hams, 1 year old 3 lb.
High flavoured hung beef 3 lb.
Smoked ox tongues 3 lb.
Hard back fat of bacon 4 lb.
Peel the tongues after being boiled and reject the roots and tips. Cut
the four first of the above up into dice and pound them separately
into smooth pastes, with mucilage of gum tragacanth and fresh
butter. Next cut the fat bacon into dice or cubes as large as the finest
growth of peas, no rind or gristles to be retained; then mix intimately
together,
Garlic, minced 1½ oz.
Shalots, minced 6 oz.
Juniper berries, in fine powder 3 oz
Jamaica pepper, in fine powder 3 oz.
Black peppercorns 3 oz.
Bay salt, in fine powder 1 lb.
Coarse sugar ¾ lb.
and blending all the meats well, season highly with the mixture, and
put it down in a jar for a week to mellow. Then work the mass well for
half an hour. Get some of the largest ox intestines, and soak them in
luke-warm salt and water, wipe them dry and proceed to fill them,
keeping out the air as much as possible, which you will effect by
regular and even pressure, and pricking, only where necessary, with
a stocking-needle. Make your polonies about a foot long each, and
put them aside as done until the next day; then repeat the pressure
and tie them up finally. They must be put into boiling-water with a
little salt and saltpetre, and after once boiling, simmer only for half an
hour. Then take them up, wipe dry, and hang in a current of air for a
week, being turned daily without fail. Then smoke them with
Oak lops 2 parts
Beech chips 2 parts
Fern 1 part
Peat 1 part
for a month. Stow them away in malt cooms. They will be prized by
those persons who delight in high flavours. They need no coating;
nay, many foreigners prefer them mouldy on the outsides.
german saveloys.
Take rough Hambro’ smoked beef 2 lb.
Neats’ tongues,
smoked 1 lb.
Smoked ham 1 lb.
Fat of bacon 2 lb.
Boil the tongue moderately, peal and cut off the gross root tip. Cut up
the whole of the meat into large dice, and pound it thoroughly, mixing
the fat in equally in all parts of the mass. Pick out all skins, sinews,
&c., and mix a pound of good moist sugar throughout it, so let it lie
two days. Then take
Sage leaves, in fine powder 3 oz.
Garlic, minced finely 2 oz.
Shalots 2 oz.
Bay leaf, in powder 2 oz.
Chillies, or capsicum, in
powder 3 oz.
mix them well and then sift them, and blend them well with the meat,
so that all parts may partake of the flavour alike; put it into a jar,
which bung up close and set it aside for a week to get mellow. Now
try a small quantity of it: if it suits your taste, well and good, if not add
seasoning. Now fill your sausage skins, and when nice and solid
prick them a little, and put them into a pan of boiling water to simmer
slowly three quarters of an hour. Then take them out and let go cold,
and next day wipe them and smoke them three weeks with
Oak lops and dust 3 parts
Fern or grass turfs 3 parts
then hang them up in a dry room and keep them with hams, tongues,
&c. These will be excellent in a month, just popped into boiling water
for five minutes, or fried in olive oil and eaten cold.
marinated salmon.
Take six or eight pounds of the middle of a large fish, in
preference to a similar weight of the whole of a grilse or salmon
trout, scale it and cut off the fins, split it open at the back and reserve
the roe and liver; wipe the fish out nicely, and strew moist sugar all
over the red side, put it away on a dish until the next day. Then make
the following mixture,
Bay leaf, in powder 1 oz.
Mace, in powder ½ oz.
Cloves, in powder ¾ oz.
White pepper, in powder ¾ oz.
Table salt 1¼ lb.
Take out the backbone neatly and rub the fish on both sides well with
the mixture and the former sugar; lay three or four laurel leaves upon
the red face of the thick side, turn the thin side over upon them, and
set it away in a cool place for twenty-four hours. Then take it up,
wipe dry, and cut the sides into fitting pieces, and place them in a
deep dish upon the spices, and half a pint of Rhenish wine or Cape
Madeira; tie double paper over and bake it in a slow oven till done
enough. Pour off the pickle while yet warm, and set the pieces on a
sieve to drip until the next day—covered close with a cloth to prevent
the action of the air upon it, and thus to preserve the colour. Now
choose your pots according to the size of your family, and into each
one place a piece of the fish, the red face downwards, and fill up with
genuine olive oil, let remain until the next day, when add more oil,
and again on the third day replenishing what has been absorbed by
the fish. Then tie wetted bladder over the pots and keep them in a
cool dry air. This cannot fail of gaining the approval of all who
partake of it, and is the most certain method of obtaining fresh
salmon in the winter months. The same oil will do again and again
for a similar purpose.
marinated shrimps.
To ensure this delicacy of first-rate quality you must buy your
shrimps alive, and boil and pick them at home with all possible
despatch. Set a gallon of live shrimps in three quarts of boiling water,
in which one and half pounds of bay or rock salt has been dissolved,
and boil them fifteen minutes, then strain off the water and as soon
as possible commence shelling them, and keep them covered with
cloths as you proceed. Be particular that no refuse or pieces of the
shells remain to disgrace the preparer, and laying them lightly on
clean dishes, mix amongst them the following seasoning in very fine
powder, being well sifted and dried the day previous and kept bottled
up. I repeat that the shrimps must have been deprived of all their
moisture with the assistance of a moderately cool oven, and not two
fish to be seen sticking together. Nor can any excuse avail in this
instance, as the less time that is occupied in potting these sorts so
much better chance will there be of your total success in the product.
Mace, in finest powder 1 oz.
Nutmeg, in finest powder 2 oz.
Cloves, in finest powder 2 oz.
Table salt, in finest powder 1 lb.
Loaf sugar, in finest
powder ¾ lb.
When seasoned to your entire satisfaction, the fish however fully
retaining their own fine flavour, fill your pots, which must be the
cleanest and best dried possible; press the shrimps well down, and
set them as you proceed at the mouth of your cool oven until there is
no evaporation observable. Now take them up, press down again,
and laying one or two bay leaves on the top, fill up with the best olive
oil, and set away in a cool dry room. Next day replenish the oil that
has been absorbed, and not till after the third day tie bladder over.
Plenty of oil must cover the fish, and although potted shrimps are not
expected to keep well after three or four days, yet you may expect
every satisfaction from this process. If decay soon takes place, it will
be owing to the fish not having been well dried in the process. As to
the preservation of the true flavour of the fish, this preparation
demands our decided preference.
marinated herrings.
The freshest full-roed herrings must be taken for this purpose.
Scale twenty of the shortest and fattest you can get in the middle of
the season, take off the heads, tails, fins, and open them at the
bellies, clean all out, scrape the backbone, and washing the fish in
salt and water, wipe them dry and let them lie until next day, after
rubbing a dessert-spoonful of good moist sugar into the inside of
each fish. Lay them upon their backs in any vessel not too deep, and
cover the fish over with the following mixture—the roes should be
nicely washed, dried, and laid by the side of the fish:
Coarse sugar 1 lb.
Bay salt, in fine
powder ¾ lb.
Black pepper 1 oz.
Eschalots, minced 1 oz.
Nutmegs, grated 1 oz.
putting half the fish in one layer then a layer of the mixture, and then
a layer of fish above that, and the spices covering all; so let them lie
covered up with a cloth three days. Then wipe the fish dry, place the
roes inside, cut them across in two parts, tie up in rolls with calico,
and lay them with plenty of bay leaves and four laurel leaves in a
deep dish and bake them, just covered over with good sound porter;
then while warm pour off the liquor, and set the fish on a sieve to go
cold, and next day put each one into a white earthenware jar and
cover with olive oil with the same precautions as before. In two
months they will be mellow and rich and greatly liked. The porter in
which they were baked, being boiled twenty minutes with a dozen of
shalots and cayenne, will be a very good cold sauce for chops,
steaks, fish, &c.
marinated sprats.
These shall be superior to what were called “sardines in oil,”
some thirty years ago, and sold in London at 4s. 6d. at first in small
tin boxes, and afterwards at 2s. 6d., each tin containing about
sixteen sprats—for sprats they certainly were. Take a peck of fresh
sprats and pick out for your present use as many of the largest and
most sound as will suit your purpose. Pull off the heads, cut off the
fins and tails, and draw out the little guts, wash them quickly through
salt and water, and dry them between cloths. Have ready the
following:
Mace, in finest powder 1 oz.
Cloves, in finest powder 2 oz.
Nutmeg, in finest
powder 1 oz.
Saltpetre, in finest
powder 3 oz.
Table salt, in finest
powder 1 lb.
Bay leaf, in finest
powder 3 oz.
with which rub each fish on the inside first, and then throughout the
bulk; put them into small pots of white earthenware, closely packed;
tie bladder over them, merely to keep out the water, and place them
in a stewpan, adding water to reach half way up the sides of the jars,
cover the pan and set it on a slow fire to simmer until the fish are
cooked; then take them up, remove the covers, and set them aside
till the next day, when, pouring off any oil or fat that may have been
given out in cooking, fill up with olive oil and tie bladders safely over.
potted smelts.
For this purpose the smaller fish will do very well. Cut them open
at the belly, clean out and wash in salt and water, having first cut off
the tails and fins; now season them inside with
Mace, in powder ½ oz.
Nutmeg, in powder 1 oz.
Table salt 3 oz.
Cayenne pepper ½ oz.
Bay leaf ¾ oz.
and let them lie till next day, when lay them in oblong pots and cover
them with clarified butter; bake them in a slow oven, and when done
enough pour off the butter, and drain effectually, and let them remain
twelve hours. Now warm up the butter again in a water bath, and
running it through a warmed sieve, pour the clear again over the fish,
adding more clarified butter to cover well. Tie bladder over and keep
dry.
potted lobsters.
Take a couple of fine lobsters, place them in a tub with plenty of
weak salt and water, and brush them well from froth and slime, then
wash in pure water and pop them into boiling water in which some
salt and saltpetre have been dissolved. When done lay them on a
sieve to get cold, and next day cut open the shells, crack the claws
and take out the meat, which then pick over carefully from skins and
specks, the coral also must be separated and examined. Now cut
the meat into dice and pound it finely in a mortar, till of a nice smooth
consistence, adding clarified butter at pleasure. Then season with
Mace, in fine powder ¾ oz.
Nutmeg, in fine powder 1 oz.
Bay leaf, in fine powder 1 oz.
White pepper, in fine
powder 1 oz.
Cloves, in fine powder ¾ oz.
and working the paste well proceed to fill white pots, and putting a
part of the coral into the middle of each pot. Press well in and set
aside for the night. Put the pots next into a slow oven, and let the
steam escape that might arise, and when you have got them as dry
as it is possible, without changing the colour of the preparation, set
them by to go cold; then cover with clarified butter effectually and
writing paper over the tops of the pots.
potted crabs.
To meet with well potted crabs is a very rare occurrence, and,
speaking generally, is attributable to the carelessness of the
preparer. Crabs are very often out of season, that is, cannot be got
without great trouble and expense, and they are very much liked;
these admissions furnish reasons why we should have some well
preserved. Take half a dozen eastern coast crabs—those of
Hartlepool and neighbourhood are always sound and well flavoured,
while those on the western coast and about Ireland are little worth—
plug up all the holes with wooden pegs, throw them into a tubful of
salt and water and brush them thoroughly, then wash in pure water
and put them into boiling water to be cooked; then take them up and
lay them to get cold; pull off the claws and put the large shells into a
slow oven after having run off any water that may have collected in
them, and when no more steam arises from the slow drying, set
them also to get cold. Take all the meat out of the claws, pick out
very carefully all the little skins and strings, cut it into dice and pound
it in a mortar with clarified butter until of a nice plastic mass, which
cover up in a cloth. Now attack the body shells, pick out all the solid
meat, and, setting the coral aside, throw out all the skins and refuse
you can find, and beat up this also with best Durham mustard, as for
the table, some cayenne, chillie vinegar, and table salt. Place some
of this at the bottom of each pot, and having ready this seasoning,
mix what is requisite with the meat from the claws:
Mace 1 oz.
Cloves 1½ oz.
Nutmeg 1 oz.
Bay leaf 1 oz.
Table salt 6 oz.
White pepper 2 oz.
Work this well into the mass, and having put a portion of the hard
coral into each pot, fill up with the seasoned claw meat. Set the pots
in a slow oven to evaporate what moisture you can, then set aside
and when cold pour clarified butter plentifully over, which, when cold,
must again be covered with writing paper. If your ingredients were
genuine, your butter sweet, and well managed, and the fish of prime
quality, you will have a choice or rare preparation of these generally
admired fish.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com