Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

The new generation of security threats has been promoted by digital currencies and real-time applications, where all users develop new ways to communicate on the Internet. Security has evolved in the need of privacy and anonymity for all users and his portable devices. New technologies in every field prove that users need security features integrated into their communication applications, parallel systems for mobile devices, internet, and identity management. This review presents the key concepts of the main areas in computer security and how it has evolved in the last years. This work focuses on cryptography, user authentication, denial of service attacks, intrusion detection and firewalls.

[1]  Manoj Kumar,et al.  Visual Cryptography: A Literature Survey , 2018, 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA).

[2]  Syed Akram,et al.  Survey on usable and secure two-factor authentication , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[3]  Chirag N. Modi,et al.  Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review , 2017, The Journal of Supercomputing.

[4]  Sreela Sreedhar,et al.  An improved secret sharing using XOR-based Visual Cryptography , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).

[5]  Fang-Yie Leu,et al.  Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[6]  Nikil Dutt,et al.  Special session: trends, challenges and needs for lattice-based cryptography implementations , 2017, 2017 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).

[7]  Steve Mansfield-Devine Weaponising the Internet of Things , 2017, Netw. Secur..

[8]  Anurag Jain,et al.  An Improved Method to Detect Intrusion Using Machine Learning Algorithms , 2016 .

[9]  Ján Hurtuk,et al.  Safe user authentication in a network environment , 2017, 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI).

[10]  Michael Backes,et al.  Linking Amplification DDoS Attacks to Booter Services , 2017, RAID.

[11]  Scott Hazelhurst,et al.  NFShunt: A Linux firewall with OpenFlow-enabled hardware bypass , 2015, 2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN).

[12]  Tsai-Hua Kang,et al.  Random graphic user password authentication scheme in mobile devices , 2017, 2017 International Conference on Applied System Innovation (ICASI).

[13]  Peng Zhang,et al.  Collaborative network security in multi-tenant data center for cloud computing , 2014 .

[14]  Huashan Chen,et al.  Quantifying the security effectiveness of firewalls and DMZs , 2018, HotSoS.

[15]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[16]  Dongsu Han,et al.  DFC: Accelerating String Pattern Matching for Network Applications , 2016, NSDI.

[17]  Francesco Palmieri,et al.  Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks , 2017, IEEE Systems Journal.

[18]  D.W.Y.O. Waidyarathna,et al.  Intrusion Detection System with Correlation Engine and Vulnerability Assessment , 2018 .

[19]  Zubair A. Baig,et al.  Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services , 2017, J. Netw. Comput. Appl..

[20]  Michael Naehrig,et al.  Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.

[21]  Jan Medved,et al.  OpenDaylight: Towards a Model-Driven SDN Controller architecture , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[22]  Pritam Gajkumar Shah,et al.  Revisting of elliptical curve cryptography for securing Internet of Things (IOT) , 2018, 2018 Advances in Science and Engineering Technology International Conferences (ASET).

[23]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[24]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[25]  Ming Jiang,et al.  Two-Way Graphic Password for Mobile User Authentication , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[26]  D. Gauthier,et al.  High-dimensional quantum cryptography with twisted light , 2014, 1402.7113.

[27]  Pramod Kumar,et al.  Remote User Authentication Scheme: A Comparative Analysis and Improved Behavioral Biometrics Based Authentication Scheme , 2016, 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE).

[28]  George M. Mohay,et al.  IDS Interoperability and Correlation Using IDMEF and Commodity Systems , 2002, ICICS.

[29]  D. Guan,et al.  ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL , 2016 .

[30]  Mauro Conti,et al.  SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks , 2017, IEEE Transactions on Network and Service Management.

[31]  Abdelkader H. Ouda,et al.  A hybrid-based filtering approach for user authentication , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).

[32]  Ainuddin Wahid Abdul Wahab,et al.  Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing , 2018 .

[33]  Abhishek Javali,et al.  Quantum cryptography for IoT: APerspective , 2017, 2017 International Conference on IoT and Application (ICIOT).

[34]  Stuart Harvey Rubin,et al.  Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[35]  Wesley M. Eddy,et al.  TCP SYN Flooding Attacks and Common Mitigations , 2007, RFC.

[36]  Rojalina Priyadarshini,et al.  An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack , 2018, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT).

[37]  Yang Li,et al.  Performance Analysis of Honeypot with Petri Nets , 2018, Inf..

[38]  Chirag Sheth,et al.  Performance Evaluation and Comparative Analysis of Network Firewalls , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[39]  Reihaneh Safavi-Naini,et al.  Reconciling user privacy and implicit authentication for mobile devices , 2015, Comput. Secur..

[40]  Sazzad Hossain,et al.  Generation of one-time keys for single line authentication , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[41]  M. Hemanth Kumar,et al.  Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks , 2019 .

[42]  D. P. Gaikwad,et al.  Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA , 2016, 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT).

[43]  Aiko Pras,et al.  Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire? , 2017, J. Inf. Commun. Ethics Soc..

[44]  Jie Wang,et al.  An authentication method based on user specific behavior , 2016, 2016 5th International Conference on Computer Science and Network Technology (ICCSNT).

[45]  Mihir Bellare,et al.  Robust Encryption , 2010, TCC.

[46]  Rocky K. C. Chang,et al.  Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..

[47]  S. B. Somani,et al.  Biometric user authentication using brain waves , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[48]  Omer Reingold,et al.  Incremental Deterministic Public-Key Encryption , 2012, EUROCRYPT.

[49]  Steven Furnell,et al.  Continuous user authentication using multi-modal biometrics , 2015, Comput. Secur..

[50]  Stefan C. Kremer,et al.  Network intrusion detection system based on recursive feature addition and bigram technique , 2018, Comput. Secur..

[51]  C. Chellappan,et al.  Efficient SYN Spoofing Detection and Mitigation Scheme for DDoS Attack , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).

[52]  Abdelkader Ouda A framework for next generation user authentication , 2016, 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC).

[53]  G. Murali,et al.  Comparison of classical and quantum cryptography using QKD simulator , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).

[54]  Eiichiro Fujisaki,et al.  All-But-Many Encryption , 2017, Journal of Cryptology.

[55]  Matthew Smith,et al.  You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores , 2014, Financial Cryptography.

[56]  Ilan Komargodski,et al.  Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions , 2015, TCC.

[57]  Gil Segev,et al.  Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions , 2013, EUROCRYPT.

[58]  Subhradeep Biswas,et al.  Password security system with 2-way authentication , 2017, 2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).