Open Access Open Access  Restricted Access Subscription or Fee Access

Progresses in Network Safety Worldview: A Survey

Soumen Chakraborty

Abstract


This survey paper examines the different cautious models and mechanisms utilized so far in network safety. Digital protection is an exceptionally delicate issue, where advances are coordinated step by step. To effectively manage sophisticated attackers, it is necessary to cultivate strengths in the form of a cautious approach to the rapidly evolving landscape of malware and other attack methods. Specifically, digitization and data framework started a fight for strength on the internet. This paper plans to feature different challenges in network safety, ongoing integrated innovations alongside the new advances in digital protection worldview.


Full Text:

PDF

References


Sharma R. Study of latest emerging trends on cyber security and its challenges to society. Int J Sci Eng Res.. 2012; 3 (6): 1–4.

Kulkarni S, Urolagin S. Review of attacks on databases and database security techniques. Int J Emerg Technol Adv Eng. 2012; 2 (11): 253–263.

Burtescu E. Database security – attacks and control methods. J Appl Quant Methods. 2009; 4 (4): 449–454.

Deore UD, Waghmare V. Cyber security automation for controlling distributed data. In 2016 International Conference on Information Communication and Embedded Systems (ICICES). 2016 Feb 25: pp. 1–4.

Ghate S, Agrawal P. A literature review on cyber security in Indian context. J Computer Inform Technol. 2017; 8 (5): 30–36 (2017).

Homer J, Zhang S, Ou X, Schmidt D, Du Y, Rajagopalan SR, Singhal A. Aggregating vulnerability metrics in enterprise networks using attack graphs. J Computer Security. 2013; 21 (4): 561–597.

Warner M. Cybersecurity: a pre-history. Intell Natl Security. 2012; 27 (5): 781–799.

Moradian E, Hakansson A. Approach to solving security problems using meta-agents in multi agent system. In: Nguyen NT, Jo GS, Howlett RJ., Jain LC, editors. Agent and Multi-Agent Systems: Technologies and Applications, Second KES International Symposium, KES-AMSTA 2008. Lecture Notes in Computer Science. Vol. 4953. Berlin: Springer; 2009. pp. 122–131.

Bedi P, Gandotra V, Singhal A, Vats, V., Mishra, N. Avoiding threats using multi agent system planning for web based systems. In: Nguyen NT, Kowalczyk R, Chen SM, editors. ICCCI 2009: Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems. Lecture Notes in Computer Science. Vol. 5796. Berlin: Springer; 2009. pp. 709–719.

Amin S, Cárdenas A, Sastry SS. Safe and secure networked control systems under denial-of-service attacks. In Majumdar R, Tabuada P, editors. HSCC 2009: Hybrid Systems: Computation and Control. Lecture Notes in Computer Science. Vol. 5469. Berlin: Springer; 2009. pp. 31-45.

Nassar M, State R, Festor O. A framework for monitoring SIP enterprise networks. Fourth International Conference on Network and System Security, Melbourne, Australia. 2010, September 1–3. pp. 1–8. doi: 10.1109/nss.2010.79.

Hsu FH, Tso CK, Yeh YC, Wang WJ, Chen LH. BrowserGuard: a behavior-based solution to drive-by-download attacks. IEEE J Select Areas Commun. 2011; 29 (7): 1461–1468.

Gandotra V, Singhal A, Bedi P. Threat-oriented security framework: a proactive approach in threat management. Procedia Innov. 2012; 4: 487–494.

Roy A, Kim DS, Trivedi KS. Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. In: 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 2012, June 25–28.

Almasizadeh J, Adollahi M. A stochastic model of attack process for the evolution of security matrix. Computer Networks. 2013; 57 (10): 2159–2180.

Dewar R. The triptych of cyber security: a classification of active cyber defense. In: Brangetto P, Maybaum M, Stinissen J, editors. 6th International Conference on Cyber Security 2014, NATO. pp. 7–21..

Li X, Di L. A network attack model based on colored petri net. J Networks. 2014; 9 (7): 1883–1891.

Razzaq A, ANwar Z, Ahmad HF, Latif K, Munir F. Ontology for attack detection: an intelligent approach to web application security.. Computers Security. 2014; 45: 124–146.

Neisse R, Steri G, Fovino IN, Baldini G. SecKit: a model asked security tool kits for internet of things. Computers Security. 2015; 54: 60–76.

Varshney G, Misra M, Atry PK. A phish detector using lightweight search features. Computers Security. 2016; 62: 213–228.

Deore UD, Waghmare V. A literature on cyber security automation for controlling distributed data. Int J Innov Res Comput Commun Eng. 2016; 4 (2): 2013–2016.

Meszaros J, Buchalcevova A. Introducing OSSF: a framework for online service cybersecurity risk management. Computers Security; 2016; 65: 300–313.

Fernandes G Jr, Carvalho LF, Rodrigues JJPC, Proença Jr ML. Network anomaly detection using IP flows with principal component analysis and ant colony optimization. J Network Comput Appl. 2016; 64: 1–11.

Bamakan SMH, Wang H, Yingjie T, Shi Y. An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing. 2016; 199: 90–102.

Park J, Noh J, Kim M, Kang BB. Invi-server: reducing the attack surfaces by making protected server invisible on networks. Computers Security. 2017; 67: 89–106.

Wagner N, Sahin CS, Pena J, Streilein WW. Automatic generation of cyber architectures optimized for security, cost, and mission performance: a nature-inspired approach. In: Shandilya S, Shandilya S, Nagar A, editors. Advances in Nature-Inspired Computing and Applications. EAI/Springer Innovations in Communication and Computing. Cham, Switzerland: Springer; 2018. pp. 1–25.

Badsha S, Vakilinia M, Sengupta S. Privacy preserving cyber threat information sharing and learning for cyber defense. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). 2019, January 7–9.

Enoch SY, Ge M, Hong JB, Alzaid H, Kim DS. A systematic evaluation of cybersecurity metrics for dynamic networks. Computer Networks. 2018; 144: 216–229 (2018).

Semerci M, Cemgil AT, Sankur B. An intelligent cyber security system against DDoS attacks in SIP networks. Computer Networks. 2018; 136: 137–154.

Hajisalem V, Babaie S.: A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Computer Networks. 2018; 136: 37–50.

Li Y, Wang X, Kim DW, Zhang J, Dai R. Designing self-destructing wireless sensors with security and performance assurance. Computer Networks. 2018; 141: 44–56.

Dubey AK, Shandilya SK. Exploiting need of data mining services in mobile computing environments. In: 2010 International Conference on Computational Intelligence and Communication Networks, Bhopal, India. 2010, November 26–28..

Chaure R, Shandilya SK. Firewall anomalies detection and removal techniques – a survey. Int J Emerg Technol. 2010; 1 (1): 71–74.

Dubey AK, Shandilya SK. A comprehensive survey of grid computing mechanism in J2ME for effective mobile computing techniques. 2010 5th International Conference on Industrial and Information Systems, Mangalore, India. 2010, July 29–August 1. pp. 207–212.

Shandilya SK, Jain S. Opinion extraction and classification of reviews from web documents. 2009 IEEE International Advance Computing Conference, Patiala, India. 2009, March 6–7.

Shandilya S, Shandilya SK, Thakur T, Nagar AK, editors. Handbook of Research on Emerging Technologies for Electrical Power Planning, Analysis, and Optimization. Hershey, PA: IGI Global; 2016.

Patel A, Jain S, Shandilya SK. Data of semantic web as unit of knowledge. J Web Eng. 2019; 17 (8): 647–674..

Shandilya SK, Shandilya S, Deep K, Nagar AK, editors. Handbook of Research on Soft Computing and Nature-Inspired Algorithms. Hershey, PA: IGI Global; 2017. IGI Worldwide, USA (2017).

Shandilya S, Shandilya SK, Thakur T. Prioritization of transmission lines in expansion planning using data mining techniques. In: Mishra S, Sood Y, Tomar A, editors. Applications of Computing, Automation and Wireless Systems in Electrical Engineering. Lecture Notes in Electrical Engineering, Vol. 553. Singapore: Springer; 2019. pp. 403–412.

Shandilya SK, Chun SA, Shandilya S, Weippl E. Internet of Things Security: Fundamentals, Techniques and Applications. Gistrup, Denmark: River Publishers; 2018.

Shandilya SK, Chun SA, Shandilya S, Weippl E. IoT Security: An Introduction. Gistrup, Denmark: River Publishers; 2018.

Shandilya SK, Sountharrajan S, Shandilya S, Suganya E. Big data analytics framework for real-time genome analysis: A comprehensive approach. J Comput Theor Nanosci. 2019; 16 (8): 3419–3427.

Suganya E, Sountharrajan S, Shandilya SK, Karthiga M. Mobile cancer prophecy system to assist patients: big data analysis and design. J Comput Theor Neurosci. 2019; 16 (8): 3623–3628.

Shandilya SK, Wagner N, Nagar AK. Advances in Cyber Security Analytics and Decision Systems. Berlin: Springer; 2020.


Refbacks

  • There are currently no refbacks.