Skip to main content

‘Changing Trend in Network Security Measures: A Review’

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

The growing connectivity across the globe has been made possible due to Internet and web applications. Social networking and e-commerce web applications are dominating the cyberspace. Cybersecurity tends to secure the computer system, information and the connecting network from the attackers whose intention is to misuse the information and damage the resources. Network security is a bit complex mechanism as compared to information security as it does not only require securing end systems but also ensure the security of entire network system. This paper discusses the network security measures and the change in trend in application of these measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adeyinka O (2008) Internet attack methods and internet security technology, In: Second Asia international conference on modeling & simulation, AICMS 08, pp 77–82, 13–15 May 2008

    Google Scholar 

  2. Bodeau DJ, Graubart R, Fabius-Greene J (2010) Improving cyber security and mission assurance via cyber preparedness (cyber prep) levels, In: IEEE second international conference on social computing (socialcom), pp 1147–1152, 20–22 Aug 2010

    Google Scholar 

  3. National Institute of Standards and Technology (NIST) (2009) Recommended Security Controls for Federal Information Systems and Organizations, NIST Special Publication 800-53, Rev. 3, August 2009 (updated with errata May 1, 2010)

    Google Scholar 

  4. NIST (2010) Guide for applying the risk management framework to Federal information systems: a security life cycle approach, NIST SP 800-37 Revision 1, February 2010

    Google Scholar 

  5. Information Technology (IT) Governance Institute (ITGI), COBIT (Control Objectives for IT and Related Technology) (2007) V4.1

    Google Scholar 

  6. International Standards Organization (ISO) and International Electrotechnical Commission (IEC), ISO/IEC 17799:2005 (2005) Information technology—security techniques—code of practice for information security management

    Google Scholar 

  7. Saltzer JH, Schroeder MD (1975) The protection of information in computer systems. Proc IEEE 63(9):1278–1308

    Article  Google Scholar 

  8. Sandhu R, Krishnan R, White GB (2010) Towards secure information sharing models for community cyber security. In: 6th international conference on collaborative computing: networking, applications and worksharing (collaboratecom), pp 1–6, 9–12 Oct 2010

    Google Scholar 

  9. Zhao W, White G (2012) A collaborative information sharing framework for community cyber security. In: IEEE conference on technologies for homeland security (HST), pp 457–462, 13–15 Nov 2012

    Google Scholar 

  10. Zhao W, White G (2014) Designing a formal model facilitating collaborative information sharing for community cyber security. In: 47th Hawaii international conference on system sciences (HICSS), 2014, pp 1987–1996, 6–9 Jan 2014

    Google Scholar 

  11. Jakobson G (2013) Mission-centricity in cyber security: architecting cyber-attack resilient missions. In: 5th international conference on cyber conflict (CyCon), pp 1–18, 4–7 June 2013

    Google Scholar 

  12. Mostashari A (2010) Resilient critical infrastructure systems and enterprises. Imperial College Press

    Google Scholar 

  13. Rennels DA (1999) Fault-tolerant computing, Encyclopedia of Computer Science. In: Ralston A, Reilly E, Hemmendinger D (eds)

    Google Scholar 

  14. Verissimo P, Neves N, Correia M (2003) Intrusion-tolerant architectures: concepts and design. In: Lemos R, Gacek C, Romanovsky A (eds) Architecting dependable systems, LNCS 2677, Springer, Berlin

    Google Scholar 

  15. Carvalho M (2009) A distributed reinforcement learning approach to mission survivability in tactical MANETs, In: ACM conference CSIIRW 2009, Oak Ridge TN, 2009

    Google Scholar 

  16. Mission-Oriented Resilient Clouds (2011) DARPA, Information Innovation Office. http://www.darpa.mil/Our-Work/I2O/Programs/Mission-oriented-Resilient-Clouds-(MRC).aspx

  17. http://dis-dpcs.wikispaces.com/Different_types_of_Network_Security

  18. Kumar NS (2015) Review on network security and cryptography. Int Trans Electr Comput Eng Syst 3(1):1–11

    Google Scholar 

  19. Zubair Rafique M, Caballero J, Huygens C, Joosen W (2014) Network dialog minimization and network dialog diffing: two novel primitives for network security applications. In: Proceedings of the 30th annual computer security applications conference (ACSAC’14). ACM, New York, NY, USA, pp 166–175

    Google Scholar 

  20. Lu SS, Wang X-F, Mao L (2014) Network security situation awareness based on network simulation. In: IEEE workshop on electronics, computer and applications, 2014, pp 512–517, 8–9 May 2014

    Google Scholar 

  21. Wang L, Jajodia S, Singhal A, Cheng P, Noel S (2014) k-zero day safety: a network security metric for measuring the risk of unknown vulnerabilities. IEEE Trans Dependable Secur Comput 11(1):30–44

    Article  Google Scholar 

  22. Memari N, Hashim SJ, Samsudin K (2015) Container based virtual honeynet for increased network security. In: 5th National symposium on information technology: towards new smart world (NSITNSW), 2015, pp 1–6, 17–19 Feb 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swati Maurya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Maurya, S., Singhrova, A. (2018). ‘Changing Trend in Network Security Measures: A Review’. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics