Abstract
The growing connectivity across the globe has been made possible due to Internet and web applications. Social networking and e-commerce web applications are dominating the cyberspace. Cybersecurity tends to secure the computer system, information and the connecting network from the attackers whose intention is to misuse the information and damage the resources. Network security is a bit complex mechanism as compared to information security as it does not only require securing end systems but also ensure the security of entire network system. This paper discusses the network security measures and the change in trend in application of these measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adeyinka O (2008) Internet attack methods and internet security technology, In: Second Asia international conference on modeling & simulation, AICMS 08, pp 77–82, 13–15 May 2008
Bodeau DJ, Graubart R, Fabius-Greene J (2010) Improving cyber security and mission assurance via cyber preparedness (cyber prep) levels, In: IEEE second international conference on social computing (socialcom), pp 1147–1152, 20–22 Aug 2010
National Institute of Standards and Technology (NIST) (2009) Recommended Security Controls for Federal Information Systems and Organizations, NIST Special Publication 800-53, Rev. 3, August 2009 (updated with errata May 1, 2010)
NIST (2010) Guide for applying the risk management framework to Federal information systems: a security life cycle approach, NIST SP 800-37 Revision 1, February 2010
Information Technology (IT) Governance Institute (ITGI), COBIT (Control Objectives for IT and Related Technology) (2007) V4.1
International Standards Organization (ISO) and International Electrotechnical Commission (IEC), ISO/IEC 17799:2005 (2005) Information technology—security techniques—code of practice for information security management
Saltzer JH, Schroeder MD (1975) The protection of information in computer systems. Proc IEEE 63(9):1278–1308
Sandhu R, Krishnan R, White GB (2010) Towards secure information sharing models for community cyber security. In: 6th international conference on collaborative computing: networking, applications and worksharing (collaboratecom), pp 1–6, 9–12 Oct 2010
Zhao W, White G (2012) A collaborative information sharing framework for community cyber security. In: IEEE conference on technologies for homeland security (HST), pp 457–462, 13–15 Nov 2012
Zhao W, White G (2014) Designing a formal model facilitating collaborative information sharing for community cyber security. In: 47th Hawaii international conference on system sciences (HICSS), 2014, pp 1987–1996, 6–9 Jan 2014
Jakobson G (2013) Mission-centricity in cyber security: architecting cyber-attack resilient missions. In: 5th international conference on cyber conflict (CyCon), pp 1–18, 4–7 June 2013
Mostashari A (2010) Resilient critical infrastructure systems and enterprises. Imperial College Press
Rennels DA (1999) Fault-tolerant computing, Encyclopedia of Computer Science. In: Ralston A, Reilly E, Hemmendinger D (eds)
Verissimo P, Neves N, Correia M (2003) Intrusion-tolerant architectures: concepts and design. In: Lemos R, Gacek C, Romanovsky A (eds) Architecting dependable systems, LNCS 2677, Springer, Berlin
Carvalho M (2009) A distributed reinforcement learning approach to mission survivability in tactical MANETs, In: ACM conference CSIIRW 2009, Oak Ridge TN, 2009
Mission-Oriented Resilient Clouds (2011) DARPA, Information Innovation Office. http://www.darpa.mil/Our-Work/I2O/Programs/Mission-oriented-Resilient-Clouds-(MRC).aspx
http://dis-dpcs.wikispaces.com/Different_types_of_Network_Security
Kumar NS (2015) Review on network security and cryptography. Int Trans Electr Comput Eng Syst 3(1):1–11
Zubair Rafique M, Caballero J, Huygens C, Joosen W (2014) Network dialog minimization and network dialog diffing: two novel primitives for network security applications. In: Proceedings of the 30th annual computer security applications conference (ACSAC’14). ACM, New York, NY, USA, pp 166–175
Lu SS, Wang X-F, Mao L (2014) Network security situation awareness based on network simulation. In: IEEE workshop on electronics, computer and applications, 2014, pp 512–517, 8–9 May 2014
Wang L, Jajodia S, Singhal A, Cheng P, Noel S (2014) k-zero day safety: a network security metric for measuring the risk of unknown vulnerabilities. IEEE Trans Dependable Secur Comput 11(1):30–44
Memari N, Hashim SJ, Samsudin K (2015) Container based virtual honeynet for increased network security. In: 5th National symposium on information technology: towards new smart world (NSITNSW), 2015, pp 1–6, 17–19 Feb 2015
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Maurya, S., Singhrova, A. (2018). ‘Changing Trend in Network Security Measures: A Review’. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_4
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)