Science topic
Network Security - Science topic
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Questions related to Network Security
To prevent and detect man-in-the-middle attacks in the Oracle blockchain (Oracle problem) It involves a combination of cryptographic techniques, secure communication protocols, and network security measures.
I need proposals for research contributions in this aspect that can help me in my doctoral research ????
To prevent and detect man-in-the-middle attacks in the Oracle blockchain (Oracle problem) It involves a combination of cryptographic techniques, secure communication protocols, and network security measures.
I need proposals for research contributions in this aspect that can help me in my doctoral research ????
The field of cyber security is open and has multiple fields (network security, information security, and digital forensics), so I need help in suggesting some recent topics in which I can register for my Ph.D. and improve them. Thank you.
What are the best simulation tools for Network Security? Are there any free tools available?
Hello everyone,
I would like to make a thorough investigation on the most promising simulation platforms for simulation and analysis of Cyber Attacks on Cyber Physical Energy Systems, along with the application of security solutions and their impact on performance.
To the best of my knowledge, a combination of two or more simulation/emulation tools might be required. E.g. a tool representing the cyber components (such as ns-2, Omnet++, Emulab) along with a tool representing the power grid physical components, (such as MATLAB).
Since investigation and proposals of the research community is still going on, hence the selection of the simulation platform(s) seems to be inconsistent among the researchers.
Through this question, I would request the research community of this field to share their knowledge and experience in this regard, with thanks.
what kind of securities are provided by the network providers and how much security does the common people received
Please guide me on how can I find a topic for my thesis and where to start work.
Physical security
Network security
Software security
Which products would you recommend to integrate Android and iOS mobile devices into the company network? What about data security?
These days VAS are playing important roles in mobile networks, so without their security nobody can rely on them. In these instances cryptography plays an important role in securing these issues. I want to know the best way to apply cryptography VAS. Also any references would be appreciated.
I want to implement various WSN attacks and then to analyze network performance. Is there any WSN attack simulator available. How can we implement WSN attacks
Dear Researchers,
Research Greetings !
Glad to share that my all research paper publications (in peer-reviewed WOS and Scopus Index Journals) are available in the area of Wireless Networks, Security, Ad Hoc Networks, Sensor Networks, VANETs, Cloud Computing, Mobile Computing, IoT, Cyber-Physical Systems and Quantum Computing.
You may refer to these research papers available at Research Gate and use it for your applicable research work:
Professor Nirbhay Chaubey, Ph.D Computer Science
I have written a python script that can read packet details and identify abnormalities in the network. I see that NetSim has a socket interface that can be used to communicate with an external python program. But I am unable to figure out a method to send packet details to my algorithm. Upon processing the data based I also want to send commands from the Python script to NetSim to improve the network performance as well as take countermeasures in case of network attacks.
In this digital world, with increasing digital devices and data, security is a significant concern. And most cases DOS/DDoS/EDoS attacks are performed by the botnet. I want to do research to detect and prevent botnets. Can you share an efficient research title to detect and prevent botnets?
Hello everyone, I want to do a research on network security or intrusion detection system. Although we can get built in dataset in different sites such as GitHub or Kaggle, but we want to make the dataset on our own effort. So, we want some ideas about this.
I am thinking to solve something like problems of identifying malicious activity.but there are lot of papers on that.any ideas regarding the network security much deeply to solve
I have to simulate DCCP and UDP on NS2 , for my presentation and showing the differences in throughput, delay, and jitter. I want to know that NS 2.35 standalone supports DCCP simulation, do I have to write any code for this simulation?
I am new to NS2 n linux platform.
Help is appreciated.
I am working on cyber security domain. Currently, the work is to trace out the real ip address behind the VPN.
1. Is there any technique or api to trace out the real ip address which is masked with VPN?
2. How to determine whether the input ip address is original/proxy/vpn without any api support?
Researchers, Kindly provide the suggestion for the above questions.
#cybersecurity #vpn #proxy #networksecurity #researcher
What is the background story of calculating the value of d in the RSA algorithm of Cryptography and Network Security?
The value of d is required for decryption. I want to know the derivation of finding d. The equation of finding d is d = e-1mod Φ(n).
Consider an example: P = 17, q = 7, n = 119, φ (n) = 96, e = 5. From here I want to find the value of d in my hand. How can I do this?
Dear Researchgators;
For the researchers who are specialized in Cybersecurity and/or Network Security, would you please tell us a little about the difference between Cybersecurity and Network Security.
Are they both the same?
Are they different fields?
One is a subset of the other?
It would be great if you can support me with a reference?
Actually, this is not my area of interest but I am doing curiously.
Regards
Respected all,
i am interested in starting a research group on cyber and network security in my institution . Kindly advise on how should i proceed ?
Mainly i want to include faculty members and students who are interested in above domains .
Quantum communications technologies (like Quantum Key distribution) are often viewed as panacea of all ills required to make data transmission in telecom network secure. The question is - Can QKD help secure the ICT systems from computer viruses and worms?
Since I don't have any coding background its difficult for me to pick a topic in system security or network security. Please help me with any topics or suggestions you have. Thank you in advance.
Would you please suggest to me a Q1 or Q2 subscription journal (without any publishing fee) in various areas of computer networks and the Internet of Things with a fast-processing time and no limit to publishing the number of free pages (unlike IEEE IoT, IEEE Systems, IEEE Sensors, etc.)? Unfortunately, journals such as Computer Networks, Computer Communications, and FGCS have slowed down a lot in the last year or two, especially in the process of initial review by editors and assignment of reviewers.
I need an idea to research network security using machine learning?
Need some Recent Research if possible
Thanks
Today's network security is mainly based on public-key cryptography. It is expected that these algorithms will be faster to break for attackers with quantum computers. Especially in case of collecting vehicle data in central storage systems, which could be used to support autonomous driving or to solve crimes, security plays a major role. This raises the question of the application of Post-Quantum Cryptography. In which time frame are realizations seen and also the costs of the application?
According to IBM Security X-Force (2021), server access was the third most common attack type in 2020. Nearly 36% of the server access attacks X-Force Incident Response observed in 2020 targeted the finance and insurance sector, with business services (14%), manufacturing (7%), and healthcare (7%) also getting hard hit.
The threats of server access attacks do not seem to go away or rather slow down, BUT they seem to get more complicated.
Are the current mitigation techniques for preventing server access attacks well-designed?
Besides that, Do you think adopting the Zero Trust security strategy will prevent this phenomenon? According to your experience. What are your thoughts on the matter?
COVID-19 has had a significant impact on the educational sector, resulting in a shift from face-to-face to a decentralized learning environment, creating a unique opportunity for network-based academic dishonesty. Prior research has shown that during the COVID-19 pandemic, students engaged in network-based academic dishonesty as a consequence of the breach of weak and legacy software programs that monitor network-based academic dishonesty.
Are the current mitigation techniques for preventing network-based academic dishonesty well-designed? What are your thoughts on the matter?
Recommended research fields:
Applying Machine Learning methods to Network Protocols field in many areas like IoT, Sensor Networks, Network Security aspects, Traffic Predictions...
Also, he is ready to participate in present related research and in a teamwork environment to publish scientific articles.
Usecase- To provide the security of the data by building Next-generation firewalls or Is there any better firewall type to handle the normal systems. Please do suggest me any answers!!.
Can someone guide me a little? I am working on my Thesis related to IoT Security. Can you specify some major/challenging topics related to the Network Security of IoT Devices using Artificial Neural Networks? Any Precise topic/area in this field pls?
Your response in this regard will be highly helpful for me.
Thank you
According to a survey conducted by Sophos, 2020 was a tough year for education, with the sector experiencing the highest level of ransomware attacks of all industries. Ransomware attacks have been on the top list of dangerous threats to information systems for over a decade. The threats of ransomware attack do not seem to go away or rather slow down BUT seems to get more complicated.
Are the current mitigation techniques well designed to prevent the attacks? What are your thoughts?
SQL injections attacks have been on the number one list of dangerous threats to information systems for over a decade. The threats of an injection attack do not seem to go away or rather slow down BUT seems to get more complicated and more dangerous every time one is launched successfully.
Are the current mitigation techniques well crafted to halt the attacks or its high time new methods of protecting data in-situ are designed?
What do you think?
please recommend me subtopic in Honeypot network security topic for my MS level research and thesis
In my opinion, the information posted on social media portals are not 100 percent. safe.
There have been cases of hacking and stealing information from thousands of records, user profiles of these portals.
In addition, there are developed techniques for building programs that read information from commentators entered into thousands of profiles of social media portals.
Then this information is a research material for the sentiment analyzes carried out, i.e. analyzes of opinions prevailing among users of these portals on specific companies, brands, products and services.
Do you agree with my opinion?
Please reply
Best wishes

Traditional or perimeter network security models are designed to focus on keeping attackers out of the network but is vulnerable to users and devices inside the network. Zero Trust security models assume the network has been compromised and challenges the user or device to prove that they are not attackers.
In this age and time of near boundary-less network systems can we rely on Zero trust models for securing our networks against information systems attacks?
Hello!
I’m Jonathan, an MSc student studying Cyber Security at Edge Hill University. As part of my project thesis, I’m conducting a short questionnaire on small and medium enterprise cyber security and, in particular, the opinions of professional individuals on the topic of vulnerability assessment and penetration testing as a way of securing IT infrastructure. The survey also details some features of the project, including the active design and development of an autonomous VAPT tool for SMEs.
Your help on providing answers and opinions is greatly appreciated and will deliver a fundamental basis for my research. Permission is also granted if you wish to notify others that may be interested in the project.
If you wish to contribute, you can do so using this link: https://vaptian.com/go/survey. The survey is hosted by Qualtrics.
The survey is entirely optional, and all data collected is anonymous. You can terminate your participation at any time for any reason.
Thank you in advance.
Hi, my M.Sc. thesis is "Detecting Android Malware using TF-IDF and N-Gram Methods Leveraging Text Semantics of Network Flows”. In my M.Sc. thesis I have worked on malware detection to find a new solution for malware evasion problem in android environments.
I want to implement my idea with "Rapid Miner" thus I need a ".csv" data-set of malware and benign app network flows. I've downloaded many data-sets but none of the satisfied my needs.
The most appropriate data-set among all of them for me is Android Malware data-set (InvesAndMal2019).
It's a great ".csv" labeled data-set but unfortunately all of data-set rows labeled as BENIGN.
I really need a ".csv" labeled android malware data-set composed of MALWARE and BENIGN network flows.
Can anybody help me with this?!
Regards
Mikael
Hello,
I want to publish a manuscript related to communication networks and network security and I need your suggestions please for Q3 journals that don't take a long time in the review and notification process.
Thank you so much for your responses
Dear Mr. Puys,
My name is Rocio Lopez Perez, I am master student of the University of Luxembourg and I am currently doing my thesis in the topic "Anomaly Detection System for SCADA".
I saw your project in Research Gate related to Attacks Scenarios Against Industrial Systems.
Actually, my work is focused on finding malicious data in Modbus/TCP packets that can cause a failure in a Power Plant (SCADA system).
From my understanding, Master and Slaves devices in SCADA systems communicate through Modbus/TCP protocol,
e.g. Master sends to Slave: Query -> Write single Coil(5)
Slave to Master: Response -> Write single Coil(5)
Since I would like to use this dataset to train Machine Learning algorithms, I should need a big amount of data composed of benign and malicious Modbus/TCP packets (pcap files for example).
Do you happen to know where I could find benign and malicious Modbus protocol data? Do you have any advise for my Master Thesis?
Thank you very much in advance,
Best regards,
Rocio
Hello all, I'm an undergraduate student and currently I'm interested to learn more about Cryptographic for Network Security. I want to know is there any paper or journal that quickly summarize whether each Encryptions Algorithm has their own behaviour that maybe works better for its different purposes?
Like some algorithms are best-used for Cloud Computing, some others are for an E-Commerce website, some others for Social Media application, etc. that would lead to decision making of which are more suitable for algorithm for every project.
Thanks before!
In my opinion, sensitive personal data concerning individual users who set up profiles, collected on social media portals, are not fully secure. This is confirmed by the occurrence of data leaks, data theft by cybercriminals.
In connection with the above, the issue of information security on the Internet is becoming an increasingly global problem and therefore, in the global approach, institutions and security systems for the transfer of information on the Internet should be developed. The security of information on the Internet can refer to many aspects of data security both at the level of central state institutions and international organizations as well as the security of personal data of individual citizens, sensitive data of citizens collected on various websites, including social media portals.
The improvement of risk management and information security systems at the supranational level is also a key issue. Technological companies managing social media portals on the one hand try to improve data security systems about users setting up accounts on social media portals. On the other hand, it is also important to cooperate with key, central data security institutions on the Internet that operate transnational. This is important from the point of view of improving information security systems on the Internet in order to limit the possibility of using social media portals by cybercriminals operating transnational, using various social engineering techniques.
Please, answer, comments.
I invite you to the discussion.
Best wishes

What kind of scientific research dominate in the field of Cybercrime and the security of online banking?
Please, provide your suggestions for a question, problem or research thesis in the issues: Cybercrime and the security of online banking.
Please reply.
I invite you to the discussion
Best wishes

In connection with the development of cybercrime, should the surveillance of citizens by national security services be developed, expanded, increased?
To what extent can the developed range of citizens' surveillance be improved as part of the improvement of national cyber security systems?
As part of the improvement of cyber security systems, should the services for combating cybercrime be able to surveillance the entire activity of citizens on the Internet?
Are legal norms regulating the issues of cyber security, services for combating cybercrime and data security gathered in Big Data database systems of large online technology companies fully adapted to the rapidly growing ICT and Internet technology?
Please reply
Best wishes

Anyone may have some information about Transfer Learning in terms of network security, especially DDoS attacks?
Today IoT devices are required network security i want to perform some research work in this area so kindly provide Best open source tool for Artificial Intelligence IoT Network Security Simulation Tools.
What currently dominate and are the standards and instruments for ensuring the security of data transfer and analysis in Big Data database systems developed?
Please reply
Best wishes

In Mobile Ad Hoc Network I had a security issue, that is already identified by IDS.
Hi, I would like to simulate IOT/WSN ddos attacks inside some type of simulation software. I haven't found many papers simulating this specifically or comparing which simulation software (ns3, cooja, omnet++, etc) is best suited for this purpose. Any help would be much appreciated.
Hi,
I have been through some discussion regarding survey paper writing tips and tricks. However, these are very generic. I want to know how to write a survey paper related to computer science topics (e.g., blockchain,.internet of things, so on). I have some following queries regarding the aforementioned concerns.
- How to design the flow of the survey paper?
- What will be the minimum length of the survey paper?
- How to pick up a reference paper and which criteria should be the first concern while selecting it? What is the minimum number of references that should I pick?
- Is it necessary to propose an idea in the paper? If yes then is it necessary to show a performance evaluation of the proposed scheme?
- While writing a survey paper which things should I focus on or care about?
Please share your experience regarding this.
Thanks for your time and input.
Thanks in advance.
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Security of social media portals is currently one of the most important topics of social media portals and other new internet media and information services. Therefore, scientists at various universities are involved in researching this issue. Therefore, security tools for information collected in social media portals databases and data security systems on the Internet are being developed. In companies and key public institutions, systems for risk management of information systems and information transfer on the Internet are also developed.
Do you agree with me on the above matter?
In the context of the above issues, the following question is valid:
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Please reply
I invite you to the discussion
Thank you very much
I also conduct research in this matter. I am researching the security of social media portals in connection with Big Data database technology. Below are links to my publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes

For quantum cryptography(QKD) simulation, which simulator is best one
I am willing to do work on cloud security issues at SaaS and IaaS. for the same. Can anyone suggest approaches and future scopes for this?
This attack mechanism called a botnet which is illustrated in figure 01. The Botnet has Bot-Master, Command and Control Server, and many numbers of Bots. The Bot-Master is the mastermind behind the DDoS attack and it injects the malicious code to the IoT devices. These affected devices work as the army of the DDoS attack, and they are called as Bots.

Distributed denial of service (DDoS) attacks are a subclass of denial of service (DoS) attacks. A DDoS attack involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
I want to simulate security attacks in VANET. I do not know what best simulator for acheiving this and how to start?
Considering the specifics of the increasingly common IT systems and computerized advanced data processing in Internet information systems, connected to the internet database systems, data processing in the cloud, the increasingly common use of the Internet of Things etc., the following question arises:
What do you think about the security of information processing in Big Data database systems?
Please reply
Best wishes

I've just graduated in Computer Science. I would like to start a research about networking/network security/information security fields. Can anyone give me some unsolved problems of above areas to start my research?
Tcpreplay use to replay network traffic
Systems are connected in 1 modem and switch.
- What are the pros and cons of Smart contracts?
- What are the latest technologies and tools?
- What do you like and/or dislike about smart contracts?
It's an open discussion to help improve our understand of future technologies. You are welcome to share your opinions and experience.
Topics required for postgraduate dissertation in cybersecurity.
I'm currently working on my proposal for my master's thesis and would like to find out which current research topics in the field of network security are promising/interesting/hot.
By reading the literature, it is not enough to consider social online network secure if their services are secure.
Dear all
Based on Research perspectives, what is the differences between Network Security vs Information Security
I am planning to do a dissertation on intrusion prevention system. Can anyone give suggestion on how to develop one from scratch? Like what are the things that I should look upon. I have a fair idea of computer networks. I'm very much interested in information security, network security. Please provide me some intuitive and simple ways to understand the system and implement the same.
I've been dwelling around the network security field. I used Ensemble learning methods before to classify several intrusions. However, this still seems insufficient as there are more attacks beyond the given set. I'm looking for possible collaborators to initialize further research with regards to this topic. :)
here is my previous work.
I have found some datasets captured on the border router of an orgnization (e.g., The CTU-13 Dataset, http://mcfp.weebly.com/the-ctu-13-dataset-a-labeled-dataset-with-botnet-normal-and-background-traffic.html), but these data contain few internal connections within the organization.
So, could you please give me some advice about where to find a network dataset of an organization with internal connection data?
Many thanks for your time!
Will the use of Blockchain technology improve the security of information transfer on the Internet? Will the development of Blockchain technologies reduce the scale of cybercrime on the Internet?
Please, answer, comments.
I invite you to the discussion.
Best wishes

I've been working with my partner project on developing various sklearn ids models that