Advertisement

A State of the Art on Network Security

  • Vinay KumarEmail author
  • Sairaj Nemmaniwar
  • Harshit Saini
  • Mohan Rao Mamidkar
Conference paper
  • 19 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 100)

Abstract

The rapid enhancement in computer network technology field brings great conveniences to all users, but at the same time, it also brings security threats. Users need to be aware of the importance of network security. Network security is a critical issue because many types of attacks are increasing nowadays, and the protection of the user’s system is a high priority. After gathering, evaluating and analyzing the information on network security, we have done an extensive literature survey. This paper deals the various techniques based on system security and data security, viz. firewall technology and antivirus technology.

Keywords

Security Active attack Passive attack Firewall technology 

References

  1. 1.
    Li X, Wang Q, Yang L, Luo X (2011) Network security situation awareness method based on visualization. In: 2011 third international conference on multimedia information networking and security (MINES), IEEE, pp 411–415 Google Scholar
  2. 2.
    de los Reyes G, Macwan S, Chawla D, Serban C (2012) Securing the mobile enterprise with network-based security and cloud computing. In: 2012 35th IEEE Sarnoff symposium (SARNOFF), IEEE, pp 1–5Google Scholar
  3. 3.
    Agrawal A, Wahie K (2016) Analyzing and optimizing cloud-based antivirus paradigm. In: 2016 international conference on innovation and challenges in cyber security (ICICCS-INBUSH), IEEE, pp 203–207Google Scholar
  4. 4.
    Chen Z, Dong W, Li H, Zhang P, Chen X, Cao J (2014) Collaborative network security in multi-tenant data center for cloud computing. Tsinghua Sci Technol 19(1):82–94CrossRefGoogle Scholar
  5. 5.
    Shaikh ZA, Ahmed F (2010) Disarming firewall. In: 2010 international conference on information and emerging technologies (ICIET), IEEE, pp 1–6Google Scholar
  6. 6.
    Zhao X, Zhang W (2016) An anomaly intrusion detection method based on improved K-means of cloud computing. In: 2016 sixth international conference on instrumentation & measurement, computer, communication and control (IMCCC), IEEE, pp 284–288Google Scholar
  7. 7.
    Shin S, Wang H, Gu G (2015) A first step toward network security virtualization: from concept to prototype. IEEE Trans Inf Forensics Secur 10(10):2236–2249CrossRefGoogle Scholar
  8. 8.
    Khyavi MH, Rahimi M (2016) Conceptual model for security in next generation network. In: 2016 30th international conference on advanced information networking and applications workshops (WAINA), IEEE, pp 591–595Google Scholar
  9. 9.
    Sun S (2015) The research of the network security situation prediction mechanism based on the complex network. In: 2015 international conference on computational intelligence and communication networks (CICN), IEEE, pp 1183–1187Google Scholar
  10. 10.
    Alabdulatif A, Kumarage H, Khalil I, Yi X (2017) Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption. J Comput Syst Sci 90:28–45MathSciNetCrossRefGoogle Scholar
  11. 11.
    Hurley-Smith D, Wetherall J, Adekunle A (2015) Virtual closed networks: a secure approach to autonomous mobile ad hoc networks. In: 2015 10th international conference for internet technology and secured transactions (ICITST), IEEE, pp 391–398Google Scholar
  12. 12.
    Simmonds A, Sandilands P, Van Ekert L (2004) An ontology for network security attacks. In: Asian applied computing conference, Springer, Berlin, Heidelberg, pp 317–323Google Scholar
  13. 13.
    Yue X, Chen W, Wang Y (2009) The research of firewall technology in computer network security. In: Asia-Pacific conference on computational intelligence and industrial applications PACIIA 2009, vol 2, IEEE, pp 421–424Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Vinay Kumar
    • 1
    Email author
  • Sairaj Nemmaniwar
    • 1
  • Harshit Saini
    • 1
  • Mohan Rao Mamidkar
    • 1
  1. 1.National Institute of Technology JamshedpurJamshedpurIndia

Personalised recommendations