Securing Computer Networks by Networking Multiple OS kernels. (Revisting Network Security: Protecting Computer Networks from Malwares)

被引:0
|
作者
Das, Divyajyoti [1 ]
Nanda, Somesh [2 ]
机构
[1] Kalinga Inst Ind Technol KIIT Univ, Sch Comp Sci & Engn, Bhubaneswar, Orissa, India
[2] CV Raman Coll Engn, Dept Comp Sci & Engn, Bhubaneswar, Orissa, India
关键词
network; malware; kernel; architecture; threat;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Only in the past decade, malwares have assumed the identity of menace among the users of the information security highway. With their populace gone up beyond measure in the recent years, absolute protection from them is a question of ongoing research. The problem becomes more serious when it is a networked based environment. Starting from servers to clients, malwares can certainly create havoc in a networked environment. Networking among computer provides malwares with an easy mode of transport. They can easily transfer from one system to another, thus infecting several systems in no time. Numerous technologies have been employed to counter their threat. However, immunizations with these technologies keep being devised. Present scenario calls for technologies that hit the very base on which the spread of malwares in a networked environment stands. With the malware industry letting out new variants of malwares to infect large computer networks at an incredible pace, it has become imperative in the present to come up with strategies so as to counter their threat. With every new malware coming into picture, new technologies are designed to combat them and the reverse unfortunately stands true. The present scenario demands fresh technologies which strike the roots on how malwares enter a network and consequently spread inside it. The malwares have to be checked from the entry point itself because once they find a place inside the network, they can create innumerable places for them to hide. The mechanism to counter malwares in a networked environment proposed in this paper, checks the entry of malwares right from the entry point of a network itself. The architecture powered by networking among multiple OS kernels and cloud computing will certainly be a progressive step in controlling the malware menace among computer networks.
引用
收藏
页码:95 / +
页数:2
相关论文
共 16 条
  • [1] The application of Software Defined Networking on securing computer networks: A survey
    Sahay, Rishikesh
    Meng, Weizhi
    Jensen, Christian D.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 131 : 89 - 108
  • [2] TrustR: An Integrated Router Security Framework for Protecting Computer Networks
    Tan, Shuaishuai
    Li, Xiaoping
    Dong, Qingkuan
    [J]. IEEE COMMUNICATIONS LETTERS, 2016, 20 (02) : 376 - 379
  • [3] COMPUTER SECURITY AND NETWORKING PROTOCOLS - TECHNICAL ISSUES IN MILITARY DATA COMMUNICATIONS NETWORKS
    STILLMAN, RB
    DEFIORE, CR
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1980, 28 (09) : 1472 - 1477
  • [4] Evaluation of Network Reliability for Computer Networks with Multiple Sources
    Lin, Yi-Kuei
    Yeng, Louis Cheng-Lu
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2012, 2012
  • [5] A Study on Application of Neural Networks in Assessment of Computer Network Security
    Shen, Jifeng
    Xu, Jun
    Li, Kang
    Yang, Ke
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 141 - 145
  • [6] Neural networks applicated in computer network security evaluation and reliability analysis
    Zhao Jinping
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 105 - 108
  • [7] Security Evaluation Methods of Computer Networks Based on BP Neural Network
    Li, Liping
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 1191 - 1196
  • [8] Research on Computer Network Security Protection Technology Incorporating Full Convolutional Networks
    Duan, Xiqiang
    Zhang, Su
    Feng, Ling
    Zhang, Lei
    [J]. Applied Mathematics and Nonlinear Sciences, 2023,
  • [9] An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks
    Wang, Yajing
    Ma, Juan
    Sharma, Ashutosh
    Singh, Pradeep Kumar
    Gaba, Gurjot Singh
    Masud, Mehedi
    Baz, Mohammed
    [J]. JOURNAL OF SENSORS, 2021, 2021
  • [10] Automated monitoring for security camera networks: promise from computer vision labs
    Chen, Chen
    Surette, Ray
    Shah, Mubarak
    [J]. SECURITY JOURNAL, 2021, 34 (03) : 389 - 409