Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/6215
Title: Tracking of Malicious Attacks on Data Online: A Systematic Review
Authors: Isah, Abdulkadir O.
Alhassan, John K
Ismaila, Idris
Adebayo, Olawale Surajudeen
Keywords: Encryption
Countermeasures
Network
Vulnerabilities
Attack
Security
Issue Date: 2020
Publisher: Transactions and Networks on Communications
Series/Report no.: Volume 8;4
Abstract: Tracking of computer network system attacks is a proactive measure to protect against attacks on data, that are basically encrypted for confidential security reasons, while in transit on the computer information channel. Cyber security threat continues to increase in direct proportion to the rate at which internet based services are deployed. In this systematic review, 53 research papers from reputable publishers were downloaded out of which 41 papers that are closely related to tracking of malicious attackers on encrypted data online were review under the consideration of attacks on encrypted data, and tracking malicious attacks; with respect to proposed technique, problem addressed, comparison to existing methodology, parameters used, major findings and then limitations and future knowledge. The authors then deduce the classification of four varying types of attacks (Keyword Guessing Attack, Selective opening attacks, Leakage-Abuse Attacks, and Key Reinstallation Attacks) from the review, to narrow down research into the future countermeasures for these attacks. 11 research papers actual discuss countermeasures for these classification types, with Keyword Guessing Attack being the focus of 6 research work, Selective Opening Attacks have 3 papers trying to solve vulnerabilities permitting such attacks, 2 papers aimed research solutions at Leakage-Abuse Attacks, and Key Reinstallation Attacks, has mention but none of the papers reviewed proffer mitigation techniques. The remaining 30 papers concentrated discussions on general attacks on encrypted data. Inclining future research attention to the four kinds of attacks against encrypted data will improve attack detection contrary to the commonly post- mortem approach
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/6215
ISSN: 2054 -7420
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
TNC 9463.pdf365.19 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.