Science topic
Network Security - Science topic
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Questions related to Network Security
Can someone guide me a little? I am working on my Thesis related to IoT Security. Can you specify some major/challenging topics related to the Network Security of IoT Devices using Artificial Neural Networks? Any Precise topic/area in this field pls?
Your response in this regard will be highly helpful for me.
Thank you
Respected all,
i am interested in starting a research group on cyber and network security in my institution . Kindly advise on how should i proceed ?
Mainly i want to include faculty members and students who are interested in above domains .
I have written a python script that can read packet details and identify abnormalities in the network. I see that NetSim has a socket interface that can be used to communicate with an external python program. But I am unable to figure out a method to send packet details to my algorithm. Upon processing the data based I also want to send commands from the Python script to NetSim to improve the network performance as well as take countermeasures in case of network attacks.
Quantum communications technologies (like Quantum Key distribution) are often viewed as panacea of all ills required to make data transmission in telecom network secure. The question is - Can QKD help secure the ICT systems from computer viruses and worms?
Since I don't have any coding background its difficult for me to pick a topic in system security or network security. Please help me with any topics or suggestions you have. Thank you in advance.
Would you please suggest to me a Q1 or Q2 subscription journal (without any publishing fee) in various areas of computer networks and the Internet of Things with a fast-processing time and no limit to publishing the number of free pages (unlike IEEE IoT, IEEE Systems, IEEE Sensors, etc.)? Unfortunately, journals such as Computer Networks, Computer Communications, and FGCS have slowed down a lot in the last year or two, especially in the process of initial review by editors and assignment of reviewers.
I need an idea to research network security using machine learning?
Need some Recent Research if possible
Thanks
According to IBM Security X-Force (2021), server access was the third most common attack type in 2020. Nearly 36% of the server access attacks X-Force Incident Response observed in 2020 targeted the finance and insurance sector, with business services (14%), manufacturing (7%), and healthcare (7%) also getting hard hit.
The threats of server access attacks do not seem to go away or rather slow down, BUT they seem to get more complicated.
Are the current mitigation techniques for preventing server access attacks well-designed?
Besides that, Do you think adopting the Zero Trust security strategy will prevent this phenomenon? According to your experience. What are your thoughts on the matter?
COVID-19 has had a significant impact on the educational sector, resulting in a shift from face-to-face to a decentralized learning environment, creating a unique opportunity for network-based academic dishonesty. Prior research has shown that during the COVID-19 pandemic, students engaged in network-based academic dishonesty as a consequence of the breach of weak and legacy software programs that monitor network-based academic dishonesty.
Are the current mitigation techniques for preventing network-based academic dishonesty well-designed? What are your thoughts on the matter?
Recommended research fields:
Applying Machine Learning methods to Network Protocols field in many areas like IoT, Sensor Networks, Network Security aspects, Traffic Predictions...
Also, he is ready to participate in present related research and in a teamwork environment to publish scientific articles.
Usecase- To provide the security of the data by building Next-generation firewalls or Is there any better firewall type to handle the normal systems. Please do suggest me any answers!!.
According to a survey conducted by Sophos, 2020 was a tough year for education, with the sector experiencing the highest level of ransomware attacks of all industries. Ransomware attacks have been on the top list of dangerous threats to information systems for over a decade. The threats of ransomware attack do not seem to go away or rather slow down BUT seems to get more complicated.
Are the current mitigation techniques well designed to prevent the attacks? What are your thoughts?
SQL injections attacks have been on the number one list of dangerous threats to information systems for over a decade. The threats of an injection attack do not seem to go away or rather slow down BUT seems to get more complicated and more dangerous every time one is launched successfully.
Are the current mitigation techniques well crafted to halt the attacks or its high time new methods of protecting data in-situ are designed?
What do you think?
please recommend me subtopic in Honeypot network security topic for my MS level research and thesis
In my opinion, the information posted on social media portals are not 100 percent. safe.
There have been cases of hacking and stealing information from thousands of records, user profiles of these portals.
In addition, there are developed techniques for building programs that read information from commentators entered into thousands of profiles of social media portals.
Then this information is a research material for the sentiment analyzes carried out, i.e. analyzes of opinions prevailing among users of these portals on specific companies, brands, products and services.
Do you agree with my opinion?
Please reply
Best wishes
Hello!
I’m Jonathan, an MSc student studying Cyber Security at Edge Hill University. As part of my project thesis, I’m conducting a short questionnaire on small and medium enterprise cyber security and, in particular, the opinions of professional individuals on the topic of vulnerability assessment and penetration testing as a way of securing IT infrastructure. The survey also details some features of the project, including the active design and development of an autonomous VAPT tool for SMEs.
Your help on providing answers and opinions is greatly appreciated and will deliver a fundamental basis for my research. Permission is also granted if you wish to notify others that may be interested in the project.
If you wish to contribute, you can do so using this link: https://vaptian.com/go/survey. The survey is hosted by Qualtrics.
The survey is entirely optional, and all data collected is anonymous. You can terminate your participation at any time for any reason.
Thank you in advance.
Hi, my M.Sc. thesis is "Detecting Android Malware using TF-IDF and N-Gram Methods Leveraging Text Semantics of Network Flows”. In my M.Sc. thesis I have worked on malware detection to find a new solution for malware evasion problem in android environments.
I want to implement my idea with "Rapid Miner" thus I need a ".csv" data-set of malware and benign app network flows. I've downloaded many data-sets but none of the satisfied my needs.
The most appropriate data-set among all of them for me is Android Malware data-set (InvesAndMal2019).
It's a great ".csv" labeled data-set but unfortunately all of data-set rows labeled as BENIGN.
I really need a ".csv" labeled android malware data-set composed of MALWARE and BENIGN network flows.
Can anybody help me with this?!
Regards
Mikael
Hello,
I want to publish a manuscript related to communication networks and network security and I need your suggestions please for Q3 journals that don't take a long time in the review and notification process.
Thank you so much for your responses
Traditional or perimeter network security models are designed to focus on keeping attackers out of the network but is vulnerable to users and devices inside the network. Zero Trust security models assume the network has been compromised and challenges the user or device to prove that they are not attackers.
In this age and time of near boundary-less network systems can we rely on Zero trust models for securing our networks against information systems attacks?
In my opinion, sensitive personal data concerning individual users who set up profiles, collected on social media portals, are not fully secure. This is confirmed by the occurrence of data leaks, data theft by cybercriminals.
In connection with the above, the issue of information security on the Internet is becoming an increasingly global problem and therefore, in the global approach, institutions and security systems for the transfer of information on the Internet should be developed. The security of information on the Internet can refer to many aspects of data security both at the level of central state institutions and international organizations as well as the security of personal data of individual citizens, sensitive data of citizens collected on various websites, including social media portals.
The improvement of risk management and information security systems at the supranational level is also a key issue. Technological companies managing social media portals on the one hand try to improve data security systems about users setting up accounts on social media portals. On the other hand, it is also important to cooperate with key, central data security institutions on the Internet that operate transnational. This is important from the point of view of improving information security systems on the Internet in order to limit the possibility of using social media portals by cybercriminals operating transnational, using various social engineering techniques.
Please, answer, comments.
I invite you to the discussion.
Best wishes
What kind of scientific research dominate in the field of Cybercrime and the security of online banking?
Please, provide your suggestions for a question, problem or research thesis in the issues: Cybercrime and the security of online banking.
Please reply.
I invite you to the discussion
Best wishes
In connection with the development of cybercrime, should the surveillance of citizens by national security services be developed, expanded, increased?
To what extent can the developed range of citizens' surveillance be improved as part of the improvement of national cyber security systems?
As part of the improvement of cyber security systems, should the services for combating cybercrime be able to surveillance the entire activity of citizens on the Internet?
Are legal norms regulating the issues of cyber security, services for combating cybercrime and data security gathered in Big Data database systems of large online technology companies fully adapted to the rapidly growing ICT and Internet technology?
Please reply
Best wishes
Anyone may have some information about Transfer Learning in terms of network security, especially DDoS attacks?
Today IoT devices are required network security i want to perform some research work in this area so kindly provide Best open source tool for Artificial Intelligence IoT Network Security Simulation Tools.
What currently dominate and are the standards and instruments for ensuring the security of data transfer and analysis in Big Data database systems developed?
Please reply
Best wishes
In Mobile Ad Hoc Network I had a security issue, that is already identified by IDS.
Hi, I would like to simulate IOT/WSN ddos attacks inside some type of simulation software. I haven't found many papers simulating this specifically or comparing which simulation software (ns3, cooja, omnet++, etc) is best suited for this purpose. Any help would be much appreciated.
Hi,
I have been through some discussion regarding survey paper writing tips and tricks. However, these are very generic. I want to know how to write a survey paper related to computer science topics (e.g., blockchain,.internet of things, so on). I have some following queries regarding the aforementioned concerns.
- How to design the flow of the survey paper?
- What will be the minimum length of the survey paper?
- How to pick up a reference paper and which criteria should be the first concern while selecting it? What is the minimum number of references that should I pick?
- Is it necessary to propose an idea in the paper? If yes then is it necessary to show a performance evaluation of the proposed scheme?
- While writing a survey paper which things should I focus on or care about?
Please share your experience regarding this.
Thanks for your time and input.
Thanks in advance.
Dear all
Based on Research perspectives, what is the differences between Network Security vs Information Security
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Security of social media portals is currently one of the most important topics of social media portals and other new internet media and information services. Therefore, scientists at various universities are involved in researching this issue. Therefore, security tools for information collected in social media portals databases and data security systems on the Internet are being developed. In companies and key public institutions, systems for risk management of information systems and information transfer on the Internet are also developed.
Do you agree with me on the above matter?
In the context of the above issues, the following question is valid:
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Please reply
I invite you to the discussion
Thank you very much
I also conduct research in this matter. I am researching the security of social media portals in connection with Big Data database technology. Below are links to my publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes
For quantum cryptography(QKD) simulation, which simulator is best one
I am willing to do work on cloud security issues at SaaS and IaaS. for the same. Can anyone suggest approaches and future scopes for this?
This attack mechanism called a botnet which is illustrated in figure 01. The Botnet has Bot-Master, Command and Control Server, and many numbers of Bots. The Bot-Master is the mastermind behind the DDoS attack and it injects the malicious code to the IoT devices. These affected devices work as the army of the DDoS attack, and they are called as Bots.
Distributed denial of service (DDoS) attacks are a subclass of denial of service (DoS) attacks. A DDoS attack involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
Considering the specifics of the increasingly common IT systems and computerized advanced data processing in Internet information systems, connected to the internet database systems, data processing in the cloud, the increasingly common use of the Internet of Things etc., the following question arises:
What do you think about the security of information processing in Big Data database systems?
Please reply
Best wishes
I want to simulate security attacks in VANET. I do not know what best simulator for acheiving this and how to start?
I've just graduated in Computer Science. I would like to start a research about networking/network security/information security fields. Can anyone give me some unsolved problems of above areas to start my research?
Tcpreplay use to replay network traffic
Systems are connected in 1 modem and switch.
- What are the pros and cons of Smart contracts?
- What are the latest technologies and tools?
- What do you like and/or dislike about smart contracts?
It's an open discussion to help improve our understand of future technologies. You are welcome to share your opinions and experience.
Topics required for postgraduate dissertation in cybersecurity.
Hello all, I'm an undergraduate student and currently I'm interested to learn more about Cryptographic for Network Security. I want to know is there any paper or journal that quickly summarize whether each Encryptions Algorithm has their own behaviour that maybe works better for its different purposes?
Like some algorithms are best-used for Cloud Computing, some others are for an E-Commerce website, some others for Social Media application, etc. that would lead to decision making of which are more suitable for algorithm for every project.
Thanks before!
I'm currently working on my proposal for my master's thesis and would like to find out which current research topics in the field of network security are promising/interesting/hot.
By reading the literature, it is not enough to consider social online network secure if their services are secure.
I am planning to do a dissertation on intrusion prevention system. Can anyone give suggestion on how to develop one from scratch? Like what are the things that I should look upon. I have a fair idea of computer networks. I'm very much interested in information security, network security. Please provide me some intuitive and simple ways to understand the system and implement the same.
I've been dwelling around the network security field. I used Ensemble learning methods before to classify several intrusions. However, this still seems insufficient as there are more attacks beyond the given set. I'm looking for possible collaborators to initialize further research with regards to this topic. :)
here is my previous work.
I have found some datasets captured on the border router of an orgnization (e.g., The CTU-13 Dataset, http://mcfp.weebly.com/the-ctu-13-dataset-a-labeled-dataset-with-botnet-normal-and-background-traffic.html), but these data contain few internal connections within the organization.
So, could you please give me some advice about where to find a network dataset of an organization with internal connection data?
Many thanks for your time!
Will the use of Blockchain technology improve the security of information transfer on the Internet? Will the development of Blockchain technologies reduce the scale of cybercrime on the Internet?
Please, answer, comments.
I invite you to the discussion.
Best wishes
I've been working with my partner project on developing various sklearn ids models that take some pcap traffic data as input and get the classification traffic in the output (benign or attack name). Now we want to deploy our models in production so the input will now take real time traffic. What tools do we have to consider in order to get this work in a network real time interface?
Thanks!
best simulator for ICN security
In ECDH, when two person wants to share private key, they first select a point G on elliptic curve and after that, each of them pick a random integer a and b, respectively, and multiply with G. After the multiplication each of them shares aG and bG with each other and after that, they multiply again using their keys a(bG) and b(aG), respectively, and creates a shared key between themselves. However, if one person wants to communicate with a group of person (more than 2) using a shared key utilizing ECDH, how he can use this method? because each of the person may choose different integer while establishing the key.
How to employ ECDH in key exchange with a group of people?
Hello,
I'm currently looking for DDoS datasets for research purpose.
Does anyone can provide a CAIDA's file for me?(https://www.caida.org/data/passive/ddos-20070804_dataset.xml)
I've tried to request an account from IMPACT, unfortunately, it was defined due to unapproved location by DHS.
I am planning to do a dissertation on intrusion prevention system. Can anyone give suggestion on how to develop one from scratch? Like what are the things that I should look upon. I have a fair idea of computer networks. I'm very much interested in information security, network security. Please provide me some intuitive and simple ways to understand the system and implement the same.
I need a topic on Cryptography/ Network security for Ph.D study
In my opinion, interesting questions and research thesis may concern the following issues:
Are fishing, malware (spyware, trojans, ransomware, keyloggers, ...) sending cybercriminals false e-mails with links to fake websites or viruses reading passwords for online banking accounts or other techniques used by cybercriminals as the most dangerous?
Some users use antivirus software, farewall, precautionary methods in using e-mail, etc., but this has not prevented, for example, attacks from cybercriminals using ransomware that encrypt and block access to disks on the computer.
In connection with the above, the techniques of data transfer security at the Interenet are constantly improved.
IT tools are being developed and improved, including antivirus software to protect a computer, laptop, tablet or smartphone against cybercrime and viruses sent, for example, in e-mails by hackers?
In view of the above, I am asking you the following question:
What are the new trends in research on cybercrime?
Please reply
Best wishes
I want to know that what are the current methods for Authentication in a CCN system , Is there nay research paper or article on it ?
I want to simulate a node replica attack during cluster formation in centralized wireless sensor networks using cooja simulator. In simple word, simulated node replica attack during: node clustering, CH candidates , CH election
I am working on trust computation using machine learning techniques in matlab. Can someone provide me with the code on recommendation attacks to that I can apply machine learning techniques in detect the malicious activities in VANET
Thanks
Elvin
While performing encryption using public key and decryption using private key, i am always finding that encryption takes more time than decryption in elliptic curve cryptography (ECC). The key is 60 bytes.
Is this the normal behavior or i am using a wrong implementation of ECC?
If this behavior is normal then what is the reason behind it?
Thanks in advance.
I have PCAP files captured from network traffic. What should be done so that PCAP files can be done with machine learning tools? What steps are needed so that data can be analyzed with one of the unsupervised methods? Does the data have to be changed to CSV format?
We are in the process of publishing a research related to wireless sensor network security using HONEY algorithm. We are confused about the best scientific journal in which we can publish the research. Please advise on the best journal in this field.
I am searching for a dataset containing web-based attacks: mainly Sql injection, XSS, Brute force against web forms and DOS attacks. I need either the whole traffic as pcap files, or the csv files containing some statistical network features, any help?
In connection with the development of cybercrime on the Internet, the security systems for transfer and processing of data, financial transactions, electronic banking, etc. carried out on the Internet are improved. In addition to electronic banking, the key information security in the internal IT systems of central state institutions is protected. Cybercriminal attacks on cyber-banking systems and hacker attacks aimed at companies to extort ransom for decrypting data encrypted by computer viruses on disks (cybercriminal ransomware attacks) and hack attacks from abroad on key central institutions, ministries and other institutions of the public administration sector and enterprises of strategic branches of the national economy.
In connection with the above, I am asking you:
Do you think, for security reasons, everything that happens on the Internet should be analyzed by the public security services?
Please answer
Best wishes
Is there a dataset already available to use?
I tried this with http://www.zone-h.com and apparently this collection should be handled manually, which unfortunately is very time-consuming. Is there a better way to collect this information?
Unfortunately, despite the assurances of companies that run social media portals, the information contained on these websites is not always fully secured against the activities of cybercriminals.
In addition, the issue of downloading data from social media portals by large companies to Big Data database systems should be added in order to process them for marketing purposes.
The issue of privacy in social media is very important and is related to the security of personal information. Privacy is at risk in terms of information posted on social media portals.
Please reply. I invite you to the discussion
Dear Friends and Colleagues of RG
The problems of the analysis of information contained on social media portals for marketing purposes are described in the publication:
I invite you to discussion and cooperation.
Best wishes
The SMS verification code based password resetting and 2FA are both vulnerable to attacks. Soon after the hacker get your phone number, he/she may reset the passwords of victims accounts by intercepting password reset verification code sent via SMS. Despite of having the victims account protected with 2FA, hackers can pass through the second authentication factor by intercepting SMS verification code, hence hijacking the account. This SMS interception attack is called SS7 redirection attacks (SRAs).
Papers:
T. Fox-Brewster, “All that’s needed to hack gmail and rob bitcoin: A name and a phone number”.
T. Moore, T.Kosloff, J. Keller, G. Manes, and S. Shenoi, “Signaling system 7 (SS7) network security,” 45th Midwest Symposium on Circuits and Systems, 2002
Peeters, Christian, et al. "Sonar: Detecting SS7 redirection attacks with audio-based distance bounding." 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 2018.
”SMS SS7 Fraud”: https://www.gsma.com/newsroom/wp-content/uploads/2012/12/IR7031.pdf
Greetings, in the iscx-2012 dataset, there is a labelled-flow file and pcap files per day. Could someone tell me how to generate .CSV for use in machine learning algorithms? Can I use the labelled-flows.xml or do I have to generate a .CSV from the PCAP? Any link how to do this?
What criteria should we use when evaluating the severity of propaganda? What forms of national defense exist to guard against weaponized information? Is disinformation a human rights abuse?
Network Security Experts claim that their protocol will verifiably protect in the random oracle model against the hardness assumptions of ECC, DLP & Diffie-Hellman problem. What this mean?