Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 31172


Select areas to restrict search in scientific publication database:
10011793
A Review in Recent Development of Network Threats and Security Measures
Abstract:
Networks are vulnerable devices due to their basic feature of facilitating remote access and data communication. The information in the networks needs to be kept secured and safe in order to provide an effective communication and sharing device in the web of data. Due to challenges and threats of the data in networks, the network security is one of the most important considerations in information technology infrastructures. As a result, the security measures are considered in the network in order to decrease the probability of accessing the secured data by the hackers. The purpose of network security is to protect the network and its components from unauthorized access and abuse in order to provide a safe and secured communication device for the users. In the present research work a review in recent development of network threats and security measures is presented and future research works are also suggested. Different attacks to the networks and security measured against them are discussed in order to increase security in the web of data. So, new ideas in the network security systems can be presented by analyzing the published papers in order to move forward the research field.
Digital Object Identifier (DOI):

References:

[1] S. Tayal, N. Gupta, P. Gupta, D. Goyal, and M. Goyal, “A Review paper on Network Security and Cryptography.” Advances in Computational Sciences and Technology, vol. 10 (5), pp. 763-770, 2017.
[2] R. Khan, and M. Hasan, “Network threats, attacks and security measures: A review.” International Journal of Advanced Research in Computer Science, vol. 8 (8), pp. 116-120, 2017.
[3] S. Rathore, P. K. Sharma, V. Loia, Y.-S. Jeong, and J. H. Park, “Social network security: Issues, challenges, threats, and solutions.” Information sciences, vol. 421pp. 43-69, 2017.
[4] S. Gao, Z. Li, B. Xiao, and G. Wei, “Security threats in the data plane of software-defined networks.” IEEE network, vol. 32 (4), pp. 108-113, 2018.
[5] T. Islam, D. Manivannan, and S. Zeadally, “A classification and characterization of security threats in cloud computing.” Int J Next-Gener Comput, vol. 7 (1), pp. 268-285, 2016.
[6] L. R. Bays, R. R. Oliveira, M. P. Barcellos, L. P. Gaspary, and E. R. M. Madeira, “Virtual network security: threats, countermeasures, and challenges.” Journal of Internet Services and Applications, vol. 6 (1), pp. 1, 2015.
[7] P. Sinha, A. kumar Rai, and B. Bhushan “Information Security threats and attacks with conceivable counteraction,“ In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). IEEE, pp. 1208-1213, 2019.
[8] R. Dastres, and M. Soori, “Impact of Meltdown and Spectre on CPU Manufacture Security Issues.” vol. 18(2) pp., 62-69, 2021.
[9] A. Tayal, N. Mishra, and S. Sharma, “Active monitoring & postmortem forensic analysis of network threats: A survey.” International Journal of Electronics and Information Engineering, vol. 6 (1), pp. 49-59, 2017.
[10] Z. Lu, X. Lu, W. Wang, and C. Wang “Review and evaluation of security threats on the communication networks in the smart grid,“ In: 2010-Milcom 2010 Military Communications Conference. IEEE, pp. 1830-1835, 2010.
[11] A. Simmonds, P. Sandilands, and L. Van Ekert “An ontology for network security attacks,“ In: Asian Applied Computing Conference. Springer, pp. 317-323, 2004.
[12] M. V. Pawar, and J. Anuradha, “Network security and types of attacks in network.” Procedia Computer Science, vol. 48pp. 503-506, 2015.
[13] F. L. Greitzer, and R. E. Hohimer, “Modeling human behavior to anticipate insider attacks.” Journal of Strategic Security, vol. 4 (2), pp. 25-48, 2011.
[14] K. Kaynar, “A taxonomy for attack graph generation and usage in network security.” Journal of Information Security and Applications, vol. 29pp. 27-56, 2016.
[15] R. Khondoker, P. Larbig, D. Senf, K. Bayarou, and N. Gruschka “AutoSecSDNDemo: Demonstration of automated end-to-end security in software-defined networks,“ In: 2016 IEEE NetSoft Conference and Workshops (NetSoft). IEEE, pp. 347-348, 2016.
[16] R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan “Internet of things (IoT) security: Current status, challenges and prospective measures,“ In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, pp. 336-341, 2015.
[17] M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, and M. Jo, “Design of secure user authenticated key management protocol for generic IoT networks.” IEEE Internet of Things Journal, vol. 5 (1), pp. 269-282, 2017.
[18] H. I. Kobo, A. M. Abu-Mahfouz, and G. P. Hancke, “A survey on software-defined wireless sensor networks: Challenges and design requirements.” IEEE access, vol. 5pp. 1872-1899, 2017.
[19] M. Stawowski, “The principles of network security design.” ISSA Journal, vol. pp. 29-31, 2007.
[20] D. Barrera, I. Molloy, and H. Huang “Standardizing IoT network security policy enforcement,“ In: Workshop on Decentralized IoT Security and Standards (DISS). p 6, 2018.
[21] J. Liu, Y. Li, H. Wang, D. Jin, L. Su, L. Zeng, and T. Vasilakos, “Leveraging software-defined networking for security policy enforcement.” Information Sciences, vol. 327pp. 288-299, 2016.
[22] R. Neisse, G. Steri, and G. Baldini “Enforcement of security policy rules for the internet of things,“ In: 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 165-172, 2014.
[23] F. Hu, Q. Hao, and K. Bao, “A survey on software-defined network and openflow: From concept to implementation.” IEEE Communications Surveys & Tutorials, vol. 16 (4), pp. 2181-2206, 2014.
[24] B. Wang, K. Lu, and P. Chang “Design and implementation of Linux firewall based on the frame of Netfilter/IPtable,“ In: 2016 11th International Conference on Computer Science & Education (ICCSE). IEEE, pp. 949-953, 2016.
[25] S. Zheng, Z. Li, and B. Li “Implementation and application of ACL in campus network,“ In: AIP Conference Proceedings. vol 1. AIP Publishing LLC, p 090014, 2017.
[26] T. Hayajneh, S. Ullah, B. J. Mohd, and K. S. Balagani, “An enhanced WLAN security system with FPGA implementation for multimedia applications.” IEEE Systems Journal, vol. 11 (4), pp. 2536-2545, 2015.
[27] M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud computing: Opportunities and challenges.” Information sciences, vol. 305pp. 357-383, 2015.
[28] P. Sinha, V. Jha, A. K. Rai, and B. Bhushan “Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey,“ In: 2017 International Conference on Signal Processing and Communication (ICSPC). IEEE, pp. 288-293, 2017.
[29] M.-J. Kang, and J.-W. Kang “A novel intrusion detection method using deep neural network for in-vehicle network security,“ In: 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, pp. 1-5, 2016.
[30] R. Dastres, and M. Soori, “Secure Socket Layer in the Network and Web Security.” International Journal of Computer and Information Engineering, vol. 14 (10), pp. 330-333, 2020.
[31] S. Climent, A. Sanchez, J. V. Capella, N. Meratnia, and J. J. Serrano, “Underwater acoustic wireless sensor networks: advances and future trends in physical, MAC and routing layers.” Sensors, vol. 14 (1), pp. 795-833, 2014.
[32] V. Pruthi, K. Mittal, N. Sharma, and I. Kaushik “Network Layers Threats & its Countermeasures in WSNs,“ In: 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE, pp. 156-163, 2019.
[33] J. Singh, Y. Bello, A. Refaey, and A. Mohamed, “Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access Edge Computing.” arXiv preprint arXiv :200701246, vol. pp., 2020.
[34] N. Wagner, C. Ş. Şahin, J. Pena, J. Riordan, and S. Neumayer “Capturing the security effects of network segmentation via a continuous-time markov chain model,“ In: Proceedings of the 50th Annual Simulation Symposium. Society for Computer Simulation International, p 17, 2017.
[35] M. Oqaily, Y. Jarraya, M. Mohammady, S. Majumdar, M. Pourzandi, L. Wang, and M. Debbabi, “SegGuard: Segmentation-based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing.” IEEE Transactions on Dependable and Secure Computing, vol. pp., 2019.
[36] R. Du, C. Zhao, S. Li, and J. Li, “Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation.” EURASIP Journal on Wireless Communications and Networking, vol. 2014 (1), pp. 1-9, 2014.
[37] S. Bazrafkan, S. Thavalengal, and P. Corcoran, “An end to end deep neural network for iris segmentation in unconstrained scenarios.” Neural Networks, vol. 106pp. 79-95, 2018.
[38] V. Clincy, and H. Shahriar “Web application firewall: Network security models and configuration,“ In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, pp. 835-836, 2018.
[39] Zerkane, D. Espes, P. Le Parc, and F. Cuppens “Software defined networking reactive stateful firewall,“ In: IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, pp. 119-132, 2016.
[40] A. B. Achballah, S. B. Othman, and S. B. Saoud “FW_IP: A flexible and lightweight hardware firewall for NoC-based systems,“ In: 2018 International Conference on Advanced Systems and Electric Technologies (IC_ASET). IEEE, pp. 261-265, 2018.
[41] H. Yuan, L. Zheng, S. Qiu, X. Peng, Y. Liang, Y. Hu, and G. Deng “Design and Implementation of Enterprise Network Security System Based on Firewall,“ In: The International Conference on Cyber Security Intelligence and Analytics. Springer, pp. 1070-1078, 2019.
[42] M. N. Chowdhury, K. Ferens, and M. Ferens “Network intrusion detection using machine learning,“ In: Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer …, p 30, 2016.
[43] M. E. Kuhl, M. Sudit, J. Kistner, and K. Costantini “Cyber attack modeling and simulation for network security analysis,“ In: 2007 Winter Simulation Conference. IEEE, pp. 1180-1188, 2007.
[44] W. Saad, X. Zhou, B. Maham, T. Basar, and H. V. Poor, “Tree formation with physical layer security considerations in wireless multi-hop networks.” IEEE Transactions on Wireless Communications, vol. 11 (11), pp. 3980-3991, 2012.
[45] G. Dini, and M. Tiloca “Considerations on security in zigbee networks,“ In: 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, pp. 58-65, 2010.
[46] N. Hoque, M. H. Bhuyan, R. C. Baishya, D. K. Bhattacharyya, and J. K. Kalita, “Network attacks: Taxonomy, tools and systems.” Journal of Network and Computer Applications, vol. 40pp. 307-324, 2014.
[47] V. Gorodetski, and I. Kotenko “Attacks against computer network: Formal grammar-based framework and simulation tool,“ In: International Workshop on Recent Advances in Intrusion Detection. Springer, pp. 219-238, 2002.
[48] J. G. Alfaro, N. Boulahia-Cuppens, and F. Cuppens, “Complete analysis of configuration rules to guarantee reliable network security policies.” International Journal of Information Security, vol. 7 (2), pp. 103-122, 2008.
[49] A. Sahana, and I. S. Misra “Implementation of RSA security protocol for sensor network security: Design and network lifetime analysis,“ In: 2011 2nd International Conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology (Wireless VITAE). IEEE, pp. 1-5, 2011.
[50] C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing.” The journal of supercomputing, vol. 63 (2), pp. 561-592, 2013.
[51] X. He, T. Chomsiri, P. Nanda, and Z. Tan, “Improving cloud network security using the Tree-Rule firewall.” Future generation computer systems, vol. 30pp. 116-126, 2014.
[52] H. Hu, G.-J. Ahn, and K. Kulkarni, “Detecting and resolving firewall policy anomalies.” IEEE Transactions on dependable and secure computing, vol. 9 (3), pp. 318-331, 2012.
Vol:15 No:04 2021Vol:15 No:03 2021Vol:15 No:02 2021Vol:15 No:01 2021
Vol:14 No:12 2020Vol:14 No:11 2020Vol:14 No:10 2020Vol:14 No:09 2020Vol:14 No:08 2020Vol:14 No:07 2020Vol:14 No:06 2020Vol:14 No:05 2020Vol:14 No:04 2020Vol:14 No:03 2020Vol:14 No:02 2020Vol:14 No:01 2020
Vol:13 No:12 2019Vol:13 No:11 2019Vol:13 No:10 2019Vol:13 No:09 2019Vol:13 No:08 2019Vol:13 No:07 2019Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007