Machine Learning Techniques and Analytics for Cloud Security Advances in Learning Analytics for Intelligent Cloud IoT Systems 1st Edition Chakraborty - Download the ebook now and own the full detailed content
Machine Learning Techniques and Analytics for Cloud Security Advances in Learning Analytics for Intelligent Cloud IoT Systems 1st Edition Chakraborty - Download the ebook now and own the full detailed content
com
OR CLICK HERE
DOWLOAD EBOOK
https://ebookmeta.com/product/machine-learning-approach-for-cloud-
data-analytics-in-iot-1st-edition-sachi-nandan-mohanty-editor/
ebookmeta.com
https://ebookmeta.com/product/machine-learning-and-iot-for-
intelligent-systems-and-smart-applications-1st-edition/
ebookmeta.com
https://ebookmeta.com/product/an-analysis-of-emile-durkheim-s-on-
suicide-1st-edition-robert-easthope/
ebookmeta.com
Moonrise Exile Moonrise 1 1st Edition Avelina Kelde
https://ebookmeta.com/product/moonrise-exile-moonrise-1-1st-edition-
avelina-kelde/
ebookmeta.com
https://ebookmeta.com/product/inflammation-and-natural-products-1st-
edition-sreeraj-gopi/
ebookmeta.com
https://ebookmeta.com/product/a-world-to-live-in-an-ecologist-s-
vision-for-a-plundered-planet-1st-edition-george-m-woodwell/
ebookmeta.com
https://ebookmeta.com/product/lonely-planet-california-s-best-
trips-33-amazing-road-trips-4th-edition-lonely-planet/
ebookmeta.com
https://ebookmeta.com/product/simply-psychology-5th-edition-michael-w-
eysenck/
ebookmeta.com
Engineering Deep Learning Systems (MEAP V04) 1 / MEAP v04
Edition Chi Wang
https://ebookmeta.com/product/engineering-deep-learning-systems-
meap-v04-1-meap-v04-edition-chi-wang/
ebookmeta.com
Machine Learning Techniques
and Analytics for Cloud Security
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
The role of adaptation, learning analytics, computational Intelligence, and data analytics in the field
of cloud-IoT systems is becoming increasingly essential and intertwined. The capability of an
intelligent system depends on various self-decision-making algorithms in IoT devices. IoT-based
smart systems generate a large amount of data (big data) that cannot be processed by traditional data
processing algorithms and applications. Hence, this book series involves different computational
methods incorporated within the system with the help of analytics reasoning and sense-making in big
data, which is centered in the cloud and IoT-enabled environments. The series publishes volumes that
are empirical studies, theoretical and numerical analysis, and novel research findings.
Publishers at Scrivener
Martin Scrivener ([email protected])
Phillip Carmical ([email protected])
Machine Learning Techniques
and Analytics for Cloud Security
Edited by
Rajdeep Chakraborty
Anupam Ghosh
and
Jyotsna Kumar Mandal
This edition first published 2022 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener
Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2022 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to
obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.
wiley.com.
ISBN 978-1-119-76225-6
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines
10 9 8 7 6 5 4 3 2 1
Contents
Preface xix
Part I: Conceptual Aspects on Cloud and Applications
of Machine Learning 1
1 Hybrid Cloud: A New Paradigm in Cloud Computing 3
Moumita Deb and Abantika Choudhury
1.1 Introduction 3
1.2 Hybrid Cloud 5
1.2.1 Architecture 6
1.2.2 Why Hybrid Cloud is Required? 6
1.2.3 Business and Hybrid Cloud 7
1.2.4 Things to Remember When Deploying Hybrid Cloud 8
1.3 Comparison Among Different Hybrid Cloud Providers 9
1.3.1 Cloud Storage and Backup Benefits 11
1.3.2 Pros and Cons of Different Service Providers 11
1.3.2.1 AWS Outpost 12
1.3.2.2 Microsoft Azure Stack 12
1.3.2.3 Google Cloud Anthos 12
1.3.3 Review on Storage of the Providers 13
1.3.3.1 AWS Outpost Storage 13
1.3.3.2 Google Cloud Anthos Storage 13
1.3.4 Pricing 15
1.4 Hybrid Cloud in Education 15
1.5 Significance of Hybrid Cloud Post-Pandemic 15
1.6 Security in Hybrid Cloud 16
1.6.1 Role of Human Error in Cloud Security 18
1.6.2 Handling Security Challenges 18
1.7 Use of AI in Hybrid Cloud 19
1.8 Future Research Direction 21
1.9 Conclusion 22
References 22
v
vi Contents
4.2.4 Advantages 67
4.2.5 Disadvantages 67
4.3 Literature Review 67
4.4 Role of Sensors and Microcontrollers in Smart Home Design 68
4.5 Motivation of the Project 70
4.6 Smart Informative and Command Accepting Interface 70
4.7 Data Flow Diagram 71
4.8 Components of Informative Interface 72
4.9 Results 73
4.9.1 Circuit Design 73
4.9.2 LDR Data 76
4.9.3 API Data 76
4.10 Conclusion 78
4.11 Future Scope 78
References 78
5 Symmetric Key and Artificial Neural Network With Mealy Machine:
A Neoteric Model of Cryptosystem for Cloud Security 81
Anirban Bhowmik, Sunil Karforma and Joydeep Dey
5.1 Introduction 81
5.2 Literature Review 85
5.3 The Problem 86
5.4 Objectives and Contributions 86
5.5 Methodology 87
5.6 Results and Discussions 91
5.6.1 Statistical Analysis 93
5.6.2 Randomness Test of Key 94
5.6.3 Key Sensitivity Analysis 95
5.6.4 Security Analysis 96
5.6.5 Dataset Used on ANN 96
5.6.6 Comparisons 98
5.7 Conclusions 99
References 99
6 An Efficient Intrusion Detection System on Various Datasets Using
Machine Learning Techniques 103
Debraj Chatterjee
6.1 Introduction 103
6.2 Motivation and Justification of the Proposed Work 104
6.3 Terminology Related to IDS 105
6.3.1 Network 105
6.3.2 Network Traffic 105
6.3.3 Intrusion 106
6.3.4 Intrusion Detection System 106
6.3.4.1 Various Types of IDS 108
6.3.4.2 Working Methodology of IDS 108
viii Contents
Our objective in writing this book was to provide the reader with an in-depth knowledge
of how to integrate machine learning (ML) approaches to meet various analytical issues
in cloud security deemed necessary due to the advancement of IoT networks. Although
one of the ways to achieve cloud security is by using ML, the technique has long-standing
challenges that require methodological and theoretical approaches. Therefore, because the
conventional cryptographic approach is less frequently applied in resource-constrained
devices, the ML approach may be effectively used in providing security in the constantly
growing cloud environment. Machine learning algorithms can also be used to meet various
cloud security issues for effective intrusion detection and zero-knowledge authentication
systems. Moreover, these algorithms can also be used in applications and for much more,
including measuring passive attacks and designing protocols and privacy systems. This
book contains case studies/projects for implementing some security features based on ML
algorithms and analytics. It will provide learning paradigms for the field of artificial intelli-
gence and the deep learning community, with related datasets to help delve deeper into ML
for cloud security.
This book is organized into five parts. As the entire book is based on ML techniques,
the three chapters contained in “Part I: Conceptual Aspects of Cloud and Applications of
Machine Learning,” describe cloud environments and ML methods and techniques. The
seven chapters in “Part II: Cloud Security Systems Using Machine Learning Techniques,”
describe ML algorithms and techniques which are hard coded and implemented for pro-
viding various security aspects of cloud environments. The four chapters of “Part III: Cloud
Security Analysis Using Machine Learning Techniques,” present some of the recent studies
and surveys of ML techniques and analytics for providing cloud security. The next three
chapters in “Part IV: Case Studies Focused on Cloud Security,” are unique to this book as
they contain three case studies of three cloud products from a security perspective. These
three products are mainly in the domains of public cloud, private cloud and hybrid cloud.
Finally, the two chapters in “Part V: Policy Aspects,” pertain to policy aspects related to
the cloud environment and cloud security using ML techniques and analytics. Each of the
chapters mentioned above are individually highlighted chapter by chapter below.
xix
xx Preface
and the third is verifier. For example, to see a movie in a theater we purchase
ticket. So, the theater counter is the ticket generator; and while purchasing
a ticket here we generally don’t reveal our identifying information such as
name, address or social security number. We are allowed to enter the theater
when this ticket is verified at the gate, so, this is the verifier algorithm. This
chapter also discusses ZKP for cloud security.
–– Chapter 9 discusses an effective spam detection system for cloud secu-
rity using supervised ML techniques. Spam, which is an unwanted mes-
sage that contains malicious links, viral attachments, unwelcome images
and misinformation, is a major security concern for any digital system and
requires an effective spam detection system. Therefore, this chapter begins
by discussing the requirements for such a system. Then, it gradually moves
towards a supervised ML-technique-based spam detection system, mainly
using a support vector machine (SVM) and convolutional neural network
(CNN). Implementation results are also given with application in cloud
environment.
–– Chapter 10 describes an intelligent system for securing network from intru-
sion detection and phishing attacks using ML approaches, with a focus on
phishing attacks on the cloud environment. It begins by describing different
fishing attacks on cloud environment and then proposes a method for detect-
ing these attacks using ML. Next, analysis of different parameters for ML
models, predictive outcome analysis in phishing URLs dataset, analysis of
performance metrics and statistical analysis of results are presented.
approaches for spreading policies using network science are discussed. Then,
evaluations and matrices to evaluate policies for cloud security are described.
This chapter concludes with a presentation of all the simulation results.
–– Chapter 19 discusses the policies of iSchools with artificial intelligence,
machine learning, and robotics through analysis of programs, curriculum and
potentialities towards intelligent societal systems on cloud platform. iSchools
are a kind of consortium that develops with the collection of information and
technology-related schools and academic units. In the last decade there has
been a significant growth in the development of such academic bodies. This
chapter provides a policy framework for iSchools, the methodology involved
and a list of available iSchools. The chapter concludes with some policy sug-
gestions and future work related to iSchools.
The Editors
October 2021
Part I
CONCEPTUAL ASPECTS ON CLOUD AND
APPLICATIONS OF MACHINE LEARNING
1
Hybrid Cloud: A New Paradigm
in Cloud Computing
Moumita Deb* and Abantika Choudhury†
Abstract
Hybrid cloud computing is basically a combination of cloud computing with on-premise resources
to provide work portability, load distribution, and security. Hybrid cloud may include one public
and one private cloud, or it may contain two or more private clouds or may have two or more public
clouds depending on the requirement. Public clouds are generally provided by third party vendors
like Amazon, Google, and Microsoft. These clouds traditionally ran off premise and provide ser-
vices through internet. Whereas private clouds also offer computing services to selected user either
over the internet or within a private internal network and conventionally ran on-premise. But this
scenario is changing nowadays. Earlier distinction between private and public clouds can be done
on the location and ownership information, but currently, public clouds are running in on-premise
data centers of customer and private clouds are constructed on off premise rented, vendor-owned
data centers as well. So, the architecture is becoming complex. Hybrid cloud reduces the potential
exposure of sensitive or crucial data from the public while keeping non-sensitive data into the cloud.
Thus, secure access to data while enjoying attractive services of the public cloud is the key factor in
hybrid cloud. Here, we have done a survey on hybrid cloud as it is one of the most promising areas
in cloud computing, discuss all insight details. Security issues and measures in hybrid cloud are also
discussed along with the use of artificial intelligence. We do not intend to propose any new findings
rather we will figure out some of future research directions.
1.1 Introduction
Cloud computing is catering computing services such as storage, networking, servers, ana-
lytics, intelligence, and software though the internet on demand basis. We typically have
to pay for only for the services we use. IT is a growing industry and catering its service
requirement is challenging. On-premise resources are not sufficient always, so leveraging
attractive facilities provided by cloud service providers is often required. Typical services
Rajdeep Chakraborty, Anupam Ghosh and Jyotsna Kumar Mandal (eds.) Machine Learning Techniques and Analytics for
Cloud Security, (3–24) © 2022 Scrivener Publishing LLC
3
4 Machine Learning Techniques and Analytics for Cloud Security
provided by cloud computing are Platform as a service (PaaS), Software as a service (SaaS),
and Infrastructure as a service (IaaS). But all the clouds are not same and no one particular
cloud can satisfy all the customer. As a result, various types of services are emerging to cater
the need of any organization. The following are the facilities cater by cloud computing.
Thus, it enables the customer to extend their business by leveraging the attractive services
provided by public cloud as well as securing the delicate data through the use of private
cloud. When the demand of a business fluctuates that may be sudden peak in the business
come or sudden fall down, in those scenarios, hybrid cloud is the best possible option as
it has that flexibility [8]. Organizations can seamlessly use public cloud amenities without
directly giving access to their data centers which are part of their on-premise servers. So,
business critical data and applications can be kept safe behind, while computing power of
the public cloud can be used for doing complex tasks. Organizations will only have to pay
for the services it is using without considering the capital expenditure involve in purchasing,
programming and maintaining new resources which can be used for a short span of time and
may remain idle for long. Private cloud on the other hand is more like public cloud, but gen-
erally installed on clients datacenter and mainly focus on self-servicing, scalable structure.
Single tone service nature, service-level agreement (SLA), and similar association make the
relationship between client and cloud stronger and less demanding [33, 34].
6 Machine Learning Techniques and Analytics for Cloud Security
1.2.1 Architecture
There may be any combination of cloud services when to deploy a hybrid cloud. It may
the client has its own on-premise private cloud as IaaS and leverage public cloud as SaaS.
Private cloud may be on premise or sometimes off premise on a dedicated server [10]. There
is no fixed fits for all architecture. Private clouds can be made individually, whereas public
cloud can be hired from vendors like Amazon, Microsoft, Alibaba, Google, and IBM. Next,
a middleware is required to combine public and private cloud mostly provided by the cloud
vendors as a part of their package. Figure 1.1 gives general diagram of a hybrid cloud.
In case of hybrid cloud architecture, the following is a list of properties that must to be
kept in mind [4]:
a. Multiple devices need to be connected via LAN, WAN, or VPN with a com-
mon middleware that provides an API for user services. Rather than using a
vast network of API, a single operating system must be used throughout the
network and APIs can be built on top of that.
b. Resources are made available to all the connected devices via virtualization
and it can be scaled up to any limit.
c. The middleware does all the coordination between devices and resources are
made available on demand basis with proper authentication.
On-Premise Apps
PUBLIC CLOUD
SQL SQL
Off-Premise Apps
SaaS, Iaas and PasS
Mobile Applications
PRIVATE CLOUD
No matter how well we plan the future, it still remains uncertain and hybrid cloud pro-
vides the facility to use cloud services as and when it is required. It is also quite unlikely
that workload of an organization remains same throughout the whole year. Suppose an
organization is working on big data analytics, it can take help of public cloud computing
resources for high complex computations but that too is not needed for long run, may be
require for few months. Here, public cloud resources can be borrowed for few months only.
In the same way, startup companies can start with some trivial private resources and take
cloud services for rest of the processing. Then, based on the performance, they can plan
to expand the business with the help of public cloud. All these are possible only in case of
hybrid cloud as it has agility, scalability, data reliability, speedy recovery, and improved
connectivity and security.
hosting services in just single point of contact. North America was the most promising
hybrid cloud market place in 2018 and Asia Pacific areas shows the highest CAGR. So,
hybrid cloud is a promising area in business. Major sectors using hybrid cloud computing
are healthcare, retail, government, or public sectors, banking, entertainment media, insur-
ance, finance, communication media, etc. [14]. According to a report published by Mordor
Intelligence, North America, Middle East, Africa, Europe, and Asia Pacific are top growing
regions worldwide. Figure 1.2 shows the hybrid cloud market. Green portions represent
highly growing market. Hybrid cloud management software solution is the main reason of
this popularity. Starting from deployment to quota management, customization of service
library, costing, performance management, and governance, everything is taken care of,
like the software management tool. Mostly, the services provided by public providers are
restricted to some architecture or technology and vendor specific. But the management
tool provided by hybrid providers helps to amalgamate different services provided by var-
ious vendors. Amazon and Microsoft, the giants in this field, are working hard in the up
gradation of their management software by including advanced infrastructure templates,
libraries, API, and apps. In India, IBM is also approaching toward hybrid cloud and AI [15].
IBM invested $1 billion into a cloud ecosystem project in the month of August. They are
expected to invest more in the coming time. In India, 17% of organizations are planning to
spend investment from 42% to 49% on hybrid cloud by 2023 according to a study by IBM
IBV. Since India is heading toward a digital transformation and self-reliant camping, so the
opportunity of new technology adaptation also increasing.
• Selection of best suitable platform for cloud: As discussed, the need of every
organization is not same. Before deployment of the hybrid cloud, organi-
zations need to have a plan for the services; it will borrow from the public
Hybrid Cloud: New Paradigm in Cloud Computing 9
cloud. If it is going to use only SaaS, then it is not a problem but it is going
to use IaaS or PaaS and then it is very important to take the correct decision
from the commencement of the service as building a hybrid structure that
would not be able to handle additional workload generates severe problem.
• Whether to use unified OS or not: In true hybrid cloud, a unified OS is
installed in the middleware that basically governs the overall functionalities.
But in some cases, on-premise system may be operated by its own OS then
just with the help of internet they can connect to public cloud. The perfor-
mance of this architecture will be vast different from unified OS. OpenStack,
VMWare cloud, Nutanix, and Kubernetes are some example of cloud OS
framework. These frameworks are sufficient building the middleware and it
provides OS and all supporting application for the smooth execution of all
activities in hybrid cloud.
• How to manage different activity: Huge amount of data need to be handled
in case of hybrid cloud. A hybrid system should look into smooth accessi-
bility of data, and at the same time, security of data needs to be guaranteed.
Anyone cannot host any data onto the public cloud. Proper personnel with
adequate experience need to be engaged for the management of dedicated
applications.
• How security of data will be guaranteed: Since data is moving in between
public and private cloud, it needs to be secured. Through security mecha-
nisms of public cloud, it has developed much from its early date but still it is
not 100% secure. There are always threats of data breach. Migration of sensi-
tive need special care as sight alteration in business sensitive data might cause
severe problem in the business.
• How to integrate public cloud with existing on-premise system: Amalgamation
of public cloud onto an existing on-premise system often needs several alter-
ations in the working of the existing on-premise system. Overall performance
of the system should always improve with the addition of the public cloud,
and it should not degrade.
• How to manage common backup and disaster recovery: Data need to be
backed up to ensure reliability and availability. Backing up of all the data both
in private and public cloud need to be done. At the same time, the system
should be able to handle catastrophic failure or disaster. How to maintain a
common routine for all the operational data to accommodate those situa-
tions is key to the success of hybrid cloud deployment.
Building a hybrid cloud is a complex procedure but successful implementation will pro-
vide scalability, flexibility, security, and cost saving. More and more organizations approach-
ing toward hybrid cloud for the current benefit and future growth.
cloud providers have important role in the PaaS and IaaS markets. Synergy Research Group
reported that the growth of Amazon is very significantly high in overall growth of market.
It possesses a share of 33% of cloud market throughout the world. In second position, there
is Microsoft. Microsoft is very fast growing and in the last four quarters, and its share has
been increased by 3% and it reaches at 18%. Nowadays, cloud computing is become much
matured. It is becoming hybrid cloud, and it also becomes more enhanced as market share.
New trends have come to improve cloud computing system in 2020 than that of 2017, 2018,
and 2019 [17].
Hybrid cloud [17] provides strategy for enterprises that involve operational part of vari-
eties of job in varieties infrastructure, whether on private cloud and public cloud with a
proprietary different layers at the top level. Multi-cloud concept is similar kind of but not
to involve any private cloud. Hybrid cloud is the most popular strategy among enterprises;
58% of respondents stated that it is their choice able approach while 10% for a single public
cloud provider and 17% for multiple public clouds.
It also offers to do lift and shift on-premise apps, executing on IBM plat-
forms [18].
• Cisco Cloud Center: Cisco is popular for private cloud that also offers hybrid
solutions via its partner. Cisco Cloud Center is more secured to manage and
deploy the applications in different data centers in both private and public
cloud environments. Cisco’s partner networks are Google, CDW, Accenture,
and AT&T. Google is the biggest partner among them. It offers the hybrid
connectivity and their solutions [18].
• VMware vCloud Suite: VMware provides vendor for virtualized services.
It is relatively new than that of other service providers. VMware has the
vSphere hypervisor. Customers can run in some known public clouds or
their own data centers or cloud provider partners. These cloud providers
are able to run vSphere on-premise that creates a stable hybrid cloud infra-
structure [19].
Table 1.1 Comparison between AWS Outpost, Microsoft Azure Stack, and Google Cloud Anthos.
AWS Outpost Microsoft Azure Stack Google Cloud Anthos
Amazon has a huge tool set The customer can run in Google has come to the
and that too is rapidly their own data center. cloud market later. So,
growing. No service Azure tries to incorporate it does not have that
providers can match with that. It provides the much level of focus to
with it. But the pricing facility of hybrid cloud incorporate the customers.
is bit puzzling. Though [19]. But the strength is its
providing service for A customer can replicate technical efficiency. Some
hybrid or public cloud is his environment in Azure of its efficient tools are
not amazon’s primary focus Stack. This is very useful in applicable in data analytics,
thus incorporation of cloud case of backup disaster and machine learning, and
services with on-premise for cutting cost. deep learning.
data is not in top priority
[20]. They primarily focus
on public cloud.
12 Machine Learning Techniques and Analytics for Cloud Security
Table 1.2 Pros and cons between AWS Outpost, Microsoft Azure Stack, and Google Cloud Anthos.
Vendor Strength Weakness
AWS Outpost 1. Dominant market position 1. Managing cost
2. Extensive, mature offerings 2. Very difficult for using
3. Effective use in large organizations 3. Options are overwhelming
Microsoft 1. Second largest service provider 1. Poor documentation
Azure Stack 2. Coupling with Microsoft software 2. Management tooling is incomplete
3. Set of features is vast
4. Provides Hybrid cloud
5. Open source supported
Google Cloud 1. Designed to serve for cloud-native 1. Enters late in IaaS market
Anthos enterprises 2. Less services and features
2. Provides portability and allows 3. Not focused for enterprise
open source
3. Huge discounts and suitable
contracts
4. Expertise in DevOps
offers in load balancing and considerable scale. Google is also efficient knowledge about
different data centers and quick response time. Google stands in third in the field of market
share [21]. But, it is rapidly increasing its offers. As per Gartner, clients choose GCP as a
secondary provider than that of primary provider.
MAANPUOLUSTUS.
Saksanmaalla on naapureina kolme suurvaltaa, Venäjä, Itävalta-
Unkari ja Ranska, kolme pienempää kuningaskuntaa, Hollanti, Belgia
ja Tanska, ja vielä lisäksi kaksi pientä valtakuntaa, Sveitsi ja
Luxemburg. "Myötä- ja vastoinkäymisessä on Saksa saanut kokea",
lausuu Ratzel, "että se on Europan naapuririkkain maa. Kun nämä
naapurit keskenään sotia kävivät, niin niitten mielestä oli mukavinta
sotia sillä alueella, joka ne erotti. Kun ne jälleen sopivat, niin mikä oli
luonnollisempaa, kuin että ne toisiaan hyvittivät tämän alueen
kustannuksella, joka muka ei ollut "kenenkään maata". Koko
Europan laajassa piirissä ei ole ainoatakaan kansaa, Espanjalaisista
mongoleihin, Suomalaisista Maureihin saakka, joka ei olisi Saksan
alueella tapellut. Ja kuinka monen monet ovat Westfalin rauhan
jälkeenkin ne rauhanteot, joissa saksalaista aluetta on paloteltu!
Sana 'kansaintaistelu' on nimenomaan saksalainen. Eikä se tarkota
ainoastaan tuota suurta kansaintaistelua Leipzigin lakeudella, vaan
monen monta samanlaista kansaintaistelua on aikain kuluessa
taisteltu Saksan maassa."
Kansallistunnon herättyä, taitavain valtiomiesten toimesta, on
Saksa siitä huolimatta saavuttanut kansallisen eheyden, kohonnut
voimalliseksi suurvallaksi, jonka sotavoimat eivät ole ainoankaan
naapurin sotavoimia huonommat. Saksan seisova armeija, joka on yli
puolen miljonan suuruinen, on mallikelpoisesti järjestetty ja
harjotettu, sotalaivastoa taas lisätään niin tarmokkaasti, että Saksa
jo on merelläkin kunnioitettava vastustaja, vaikkei se olekaan
likimainkaan saavuttanut Englantia, eikä voine koskaan
saavuttaakaan.
Länsiraja.
Sveitsi.
Belgia.
Alankomaat.
J. Partsch: Mitteleuropa.
A. Hettner: Grundzüge der Länderkunde: Europa.
L. Pohle : Die Entwicklung des deutschen
Wirtschaftslebens im 19 Jahrhundert.
*** END OF THE PROJECT GUTENBERG EBOOK SAKSANMAA ***
Updated editions will replace the previous one—the old editions will
be renamed.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.