Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection
The new generation of security threats has beenpromoted by digital currencies and real-time applications, whereall users develop new ways to communicate on the Internet.Security has evolved in the need of privacy and anonymity forall users and his portable devices. New technologies in everyfield prove that users need security features integrated into theircommunication applications, parallel systems for mobile devices,internet, and identity management. This review presents the keyconcepts of the main areas in computer security and how it hasevolved in the last years. This work focuses on cryptography,user authentication, denial of service attacks, intrusion detectionand firewalls.
W. Stallings,Cryptography and Network Security: Principles and Prac-tice, 7th ed. Hoboken, NJ, USA: Pearson Education, 2017.
H. Perl, S. Fahl, and M. Smith, “You Won’t Be Needing These AnyMore: On Removing Unused Certificates from Trust Stores,” inLectureNotes in Computer Science (including subseries Lecture Notes inArtificial Intelligence and Lecture Notes in Bioinformatics), N. Christinand R. Safavi-Naini, Eds.Berlin, Heidelberg, Germany: SpringerBerlin Heidelberg, 2014, vol. 8437, pp. 307–315. [Online]. Available: http://link.springer.com/10.1007/978-3-662-45472-520
M. Abdalla, M. Bellare, and G. Neven, “Robust Encryption,”Journal ofCryptology, vol. 31, no. 2, pp. 307–350, apr 2018. [Online]. Available: http://link.springer.com/10.1007/s00145-017-9258-8
I. Komargodski, G. Segev, and E. Yogev, “Functional Encryption forRandomized Functionalities in the Private-Key Setting from MinimalAssumptions,”Journal of Cryptology, vol. 31, no. 1, pp. 60–100, jan2018. [Online]. Available: http://link.springer.com/10.1007/s00145-016-9250-8
E. Fujisaki, “All-But-Many Encryption,”Journal of Cryptology,vol. 31, no. 1, pp. 226–275, jan 2018. [Online]. Available: http://link.springer.com/10.1007/s00145-017-9256-x
I. Mironov, O. Pandey, O. Reingold, and G. Segev, “Incremental Deterministic Public-Key Encryption,”Journal of Cryptology, vol. 31, no. 1, pp. 134–161, jan 2018. [Online]. Available: http://link.springer.com/10.1007/s00145-017-9252-1
A. Raghunathan, G. Segev, and S. Vadhan, “Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions,”Journal of Cryptology, vol. 31, no. 4, pp. 1012–1063, oct2018. [Online]. Available: https://doi.org/10.1007/s00145-018-9287-y http://link.springer.com/10.1007/s00145-018-9287-y
R. Bhatnagar and M. Kumar, “Visual Cryptography: A LiteratureSurvey,” inProceedings of 2018 Second International Conferenceon Electronics, Communication and Aerospace Technology (ICECA),vol. 1.Coimbatore, India: IEEE, March 2018, pp. 78–83. [Online].Available: https://ieeexplore.ieee.org/document/8474649/
V. Purushothaman and S. Sreedhar, “An Improved Secret Sharingusing XOR-based Visual Cryptography,” in2016 Online InternationalConference on Green Engineering and Technologies (IC-GET).Coimbatore, India: IEEE, nov 2016, pp. 1–4. [Online]. Available: http://ieeexplore.ieee.org/document/7916633/
J. W. Bos, J. A. Halderman, N. Heninger, J. Moore, M. Naehrig, andE. Wustrow, “Elliptic curve cryptography in practice,” in Proceedings of the International Conference on Financial Cryptography and DataSecurity.Christ Church, Barbados: Springer, March 2014, pp. 157–175.
D. P. Shah and P. G. Shah, “Revisting of Elliptical Curve Cryptography for Securing Internet of Things (IOT),” in2018 Advances in Scienceand Engineering Technology International Conferences (ASET).AbuDhabi, United Arab Emirates: IEEE, feb 2018, pp. 1–3. [Online].Available: https://ieeexplore.ieee.org/document/8376830/
P. S. Lakshmi and G. Murali, “Comparison of Classical and Quantum Cryptography using QKD Simulator,” in2017 International Conferenceon Energy, Communication, Data Analytics and Soft Computing(ICECDS). Chennai, India: IEEE, aug 2017, pp. 3543–3547. [Online].Available: https://ieeexplore.ieee.org/document/8390120/
M. Mirhosseini, O. S. Maga ̃na-Loaiza, M. N. O’Sullivan, B. Rodenburg,M. Malik, M. P. J. Lavery, M. J. Padgett, D. J. Gauthier, andR.W.Boyd,“High-dimensional Quantum Cryptography with Twisted Light,”New Journal of Physics, vol. 17, no. 3, p.033033, mar 2015. [Online]. Available: http://stacks.iop.org/1367-2630/17/i=3/a=033033?key=crossref.59213bf25f4fcc27b182769c6459ed5e
C.H. Bennettand G. Brassard,“Quantum Cryptography: Public Key Distribution and Coin Tossing,”Theoretical Computer Science,vol.560,no.P1,pp.7–11,dec2014. [Online]. Available: http://dx.doi.org/10.1016/j.tcs.2014.05.025 https://linkinghub.elsevier.com/retrieve/pii/S0304397514004241
S. K. Routray, M. K. Jha, L. Sharma, R. Nyamangoudar, A. Javali,and S. Sarkar, “Quantum Cryptography for IoT: A Perspective,” in2017 International Conference on IoT and Application (ICIOT), vol. 2.Nagapattinam, India: IEEE, may 2017, pp. 1–4. [Online]. Available: http://ieeexplore.ieee.org/document/8073638/
H. Nejatollahi, N. Dutt, and R. Cammarota, “Trends, Challenges and Needs for Lattice-based Cryptography Implementations,” in Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hard-ware/Software Codesign and System Synthesis Companion - CODES’17. New York, New York, USA: ACM Press, 2017, pp. 1–3. [Online].Available: http://dl.acm.org/citation.cfm?doid=3125502.3125559
B. Archana, A. Chandrashekar, A. G. Bangi, B. Sanjana, and S. Akram,“Survey on Usable and Secure Two-factor Authentication,” in20172nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), vol. 2018-Janua.Bangalore, India: IEEE, may 2017, pp. 842–846. [Online]. Available: http://ieeexplore.ieee.org/document/8256716/
S.-S. Shen, T.-H. Kang, S.-H. Lin, and W. Chien, “Random Graphic User Password Authentication Scheme in Mobile Devices,” in2017International Conference on Applied System Innovation (ICASI).Sapporo, Japan: IEEE, may 2017, pp. 1251–1254. [Online]. Available: http://ieeexplore.ieee.org/document/7988123/
M. Jiang, A. He, K. Wang, and Z. Le, “Two-Way Graphic Password for Mobile User Authentication,” in2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.Ney York,New York, USA: IEEE, nov 2015, pp. 476–481. [Online]. Available: http://ieeexplore.ieee.org/document/7371525/
S. Hossain, A. Goh, C. H. Sin, and L. K. Win, “Generation of One-time Keys for Single Line Authentication,” in2016 14thAnnual Conference on Privacy, Security and Trust (PST).Auckland,New Zealand: IEEE, dec 2016, pp. 686–689. [Online]. Available: http://ieeexplore.ieee.org/document/7906957/
S. Biswas and S. Biswas, “Password Security System with 2-wayAuthentication,” in2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN),vol. 2017-Decem.Kolkata, India: IEEE, nov 2017, pp. 349–353.[Online]. Available: http://ieeexplore.ieee.org/document/8234533/
M. Uchnar and J. Hurtuk, “Safe User Authentication in a Network Environment,” in2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI).Herl’any,Slovakia: IEEE, jan 2017, pp. 000 451–000 454. [Online]. Available: http://ieeexplore.ieee.org/document/7880352/
Y.S.Soni,S.B.Somani,andV.V.Shete,“Biometric User Authentication using Brain Waves,” in2016 International Conference on Inventive Computation Technologies (ICICT), vol. 2.Coimbatore, India: IEEE, aug 2016, pp. 1–6. [Online]. Available: http://ieeexplore.ieee.org/document/7824888/
S.F.Shahandashti,R.Safavi-Naini,andN.A.Safa,“Reconciling User Privacy and Implicit Authentication for Mobile Devices,”Computers & Security, vol. 53, pp. 215–233, sep2015. [Online]. Available: http://dx.doi.org/10.1016/j.cose.2015.05.009 https://linkinghub.elsevier.com/retrieve/pii/S0167404815000838
P. Kumar and M. S. Rauthan, “Remote User Authentication Scheme: A Comparative Analysis and Improved Behavioral Biometrics Based Authentication Scheme,” in2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE).Ghaziabad, India: IEEE, sep 2016, pp. 311–313. [Online]. Available: http://ieeexplore.ieee.org/document/7938932/
N.-F. Li, P. Tian, and J. Wang, “An Authentication MethodBased on User Specific Behavior,” in2016 5th International Conference on Computer Science and Network Technology (ICCSNT).Changchun, China: IEEE, dec 2016, pp. 132–135. [Online]. Available: http://ieeexplore.ieee.org/document/8070134/
H.Saevanee,N.Clarke,S.Furnell,andV.Biscione,“Continuous User Authentication using Multi-modal Biomet-rics,”Computers&Security,vol.53,pp.234–246,sep2015. [Online]. Available: http://dx.doi.org/10.1016/j.cose.2015.06.001 https://linkinghub.elsevier.com/retrieve/pii/S0167404815000875
A. Ouda, “A Framework for Next Generation User Authentication,”in2016 3rd MEC International Conference on Big Data and SmartCity (ICBDSC).Muscat, Oman: IEEE, mar 2016, pp. 1–4. [Online].Available: http://ieeexplore.ieee.org/document/7460349/
A. Ibrahim and A. Ouda, “A Hybrid-based Filtering Approachfor User Authentication,” in2017 IEEE 30th Canadian Conferenceon Electrical and Computer Engineering (CCECE).Windsor,Ontario, Canada: IEEE, apr 2017, pp. 1–5. [Online]. Available: http://ieeexplore.ieee.org/document/7946830/
W. Eddy, “RFC 4987: TCP SYN flooding Attacks and Common Miti-gations,” RFC, Tech. Rep., 2007.
Verisign Inc., “Verisign distributed denial of service trends reportq1 2018,” https://blog.verisign.com/security/q1-2018-ddos-trends-report-58-percent-of-attacks-employed-multiple-attack-types/.
——, “Verisign distributed denial of service trends report q22018,” https://blog.verisign.com/security/ddos-protection/q2-2018-ddos-trends-report-52-percent-of-attacks-employed-multiple-attack-types/.
SecureList, “Ddos attacks in q1 2018,” https://securelist.com/ddos-report-in-q1-2018/85373/.
R. K. Chang, “Defending against flooding-based distributed Denial-of-Service Attacks: A tutorial,”IEEE communications magazine, vol. 40,no. 10, pp. 42–51, 2002.
F. Lau, S. H. Rubin, M. H. Smith, and L. Trajkovic, “Distributeddenial of service attacks,” inSystems, Man, and Cybernetics, 2000 IEEE International Conference on, vol. 3. IEEE, 2000, pp. 2275–2280.
D. Douglas, J. J. Santanna, R. de Oliveira Schmidt, L. Z. Granville,and A. Pras, “Booters: can anything justify distributed denial-of-service(ddos) attacks for hire?”Journal of Information, Communication andEthics in Society, vol. 15, no. 01, pp. 90–104, 2017.
C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “Ddos in the iot:Mirai and other botnets,”Computer, vol. 50, no. 7, pp. 80–84, 2017.
S. Mansfield-Devine, “Weaponising the internet of things,”NetworkSecurity, vol. 2017, no. 10, pp. 13–19, 2017.
M. Ficco and F. Palmieri, “Introducing fraudulent energy consumption in cloud infrastructures: a new generation of denial-of-service attacks,”IEEE Systems Journal, vol. 11, no. 2, pp. 460–470, 2017.
E. Adi, Z. Baig, and P. Hingston, “Stealthy denial of service (dos) attack modelling and detection for http/2 services,”Journal of Network and Computer Applications, vol. 91, pp. 1–13, 2017.
J. Krupp, M. Karami, C. Rossow, D. McCoy, and M. Backes, “Linkin gamplification ddos attacks to booter services,” inInternational Symposium on Research in Attacks, Intrusions, and Defenses. Springer, 2017,pp. 427–449.
L. Kavisankar, C. Chellappan, S. Venkatesan, and P. Sivasankar, “Effi-cient syn spoofing detection and mitigation scheme for ddos attack,” in2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM). IEEE, 2017, pp. 269–274.
R. Mohammadi, R. Javidan, and M. Conti, “Slicots: An sdn-based light weight counter measure for tcp syn flooding attacks,”IEEE Transac-tions on Network and Service Management, vol. 14, no. 2, pp. 487–497,2017.
A. Prakash and R. Priyadarshini, “An intelligent software defined network controller for preventing distributed denial of service attack,”in2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE, 2018, pp. 585–589.
J. Medved, R. Varga, A. Tkacik, and K. Gray, “Opendaylight: Towards a model-driven sdn controller architecture,” in2014 IEEE 15th International Symposium on. IEEE, 2014, pp. 1–6.
S. Khan, A. Gani, A. W. A. Wahab, and P. K. Singh, “Feature selection of denial-of-service attacks using entropy and granular computing,”Arabian Journal for Science and Engineering, vol. 43, no. 2, pp. 499–508, 2018.
M. Abomhara and G. M. Køien, “Cyber security and the internet ofthings: Vulnerabilities, threats, intruders and attacks,”Journal of CyberSecurity, vol. 4, no. 1, pp. 65–88, 2015.
T. Hamed, R. Dara, and S. C. Kremer, “Network intrusion detection system based on recursive feature addition and bigram technique,”Computers & Security, vol. 73, pp. 137–155, 2018.
U. Modi and A. Jain, “An improved Method to detect Intrusion using Machine Learning Algorithms,”Informatics Engineering, an International Journal (IEIJ), vol. 4, no. 2, pp. 17–29, 2016.
N. Carey, A. Clark, and G. Mohay, “IDS Interoperability and Correlation using IDMEF and commodity Systems,” in International Conference on Information and Communications Security.Springer, 2002, pp. 252–264.
D. Waidyarathna, W. Nayantha, W. Wijesinghe, and K. Y. Abeywardena,“Intrusion detection system with correlation engine and vulnerability as-sessment,”INTERNATIONAL JOURNAL OF ADVANCED COMPUTERSCIENCE AND APPLICATIONS, vol. 9, no. 9, pp. 365–370, 2018.
A. S. Desai and D. Gaikwad, “Real time hybrid Intrusion Detection System using Signature Matching Algorithm and fuzzy-GA,” in Advances in Electronics, Communication and Computer Technology (ICAECCT),2016 IEEE International Conference on. IEEE, 2016, pp. 291–294.
L. Shi, Y. Li, and H. Feng, “Performance analysis of honey pot with petrinets,”Information, vol. 9, no. 10, p. 245, 2018.
C.-M. Chen, D.-J. Guan, Y.-Z. Huang, and Y.-H. Ou, “Anomaly Network Intrusion Detection using Hidden Markov Model,”Int. J. Innov. Comput.Inform. Control, vol. 12, pp. 569–580, 2016.
B. Choi, J. Chae, M. Jamshed, K. Park, and D. Han, “DFC: Accelerating String Pattern Matching for Network Applications.” inNSDI. USENIX,2016, pp. 551–565.
C. Sheth and R. Thakker, “Performance Evaluation and comparative Analysis of Network Firewalls,” inDevices and communications (icde-com), 2011 international conference on. IEEE, 2011, pp. 1–5.
H. Chen, J.-H. Cho, and S. Xu, “Quantifying the security effectiveness of firewalls and dmzs,” in Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security. ACM, 2018,p. 9.
Z. Chen, W. Dong, H. Li, P. Zhang, X. Chen, and J. Cao, “Collaborative Network Security in multi-tenant Data Center for Cloud Computing,”Tsinghua Science and Technology, vol. 19, no. 1, pp. 82–94, 2014.
S. Miteff and S. Hazelhurst, “NFShunt: A Linux Firewall withOpenFlow-enabled Hardware bypass,” in Network Function Virtualiza-tion and Software Defined Network (NFV-SDN), 2015 IEEE Conference on. IEEE, 2015, pp. 100–106.
C. N. Modi and K. Acha, “Virtualization Layer Security challenges and Intrusion Detection/Prevention Systems in cloud Computing: Acomprehensive review,”the Journal of Supercomputing, vol. 73, no. 3,pp. 1192–1234, 2017.
F.-Y. Leu and Z.-Y. Li, “Detecting DoS and DDoS Attacks by usingan Intrusion Detection and remote Prevention System,” in Information Assurance and Security, 2009. IAS’09. Fifth International Conference on, vol. 2. IEEE, 2009, pp. 251–254.
Latin-American Journal of Computing is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
By participating as Author (s) in LAJC, I acknowledge that non-exclusive copyright is transferred to the National Polytechnic School. Find out more in our Copyright Notice.
Furthermore, if the article is accepted for publication in LAJC, Authors give their consent to the Editorial Committee to publish the article in the issue that best suits the interests of the Journal.
LAJC in no event shall be liable for any direct, indirect, incidental, punitive, or consequential copyright infringement claims related to articles that have been submitted for evaluation, or published in any issue of this journal. Find out more in our Disclaimer Notice.