skip to main content
10.1145/3386762.3386782acmotherconferencesArticle/Chapter ViewAbstractPublication PagesieeaConference Proceedingsconference-collections
research-article

Implementing Security in a Campus Network Using Free and Open Source Solutions

Published:29 May 2020Publication History

ABSTRACT

Network security is a very important concern that higher education institutions' administrators should carefully implement and supervise. There are lots technologies, innovations, current trends and other advancements that pose a great benefit but also equally constitutes emerging threats such as the implementations of Bring Your Own Device (BYOD) where regulations are still unclear. As part of the concept on the network security implementation, the CIA triad was tackled which concerns about confidentiality, integrity and availability of data and information. The conduct of this study used a literature review about network underlying threats. After identifying the underlying network threats, a thorough discussion on the available preventive measures that combat network security threats were carried out. After which, the free and open source technologies were included. The study concludes that with a very wide array of network threats, there are available free and open source solutions for network security threats and it is recommended to have these all enabled to prevent network-related damages.

References

  1. J. Fruhlinger, "What is network security? Definition, methods, jobs & salaries | CSO Online," 2018. [Online]. Available: https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-jobs-and-salaries.html. [Accessed: 02-Aug-2019].Google ScholarGoogle Scholar
  2. Comodo, "What Is Network Security? | Meaning and Types of Network Security," 2019. [Online]. Available: https://enterprise.comodo.com/blog/what-is-network-security/. [Accessed: 28-Jul-2019].Google ScholarGoogle Scholar
  3. M. Huang, W. Luo, and X. Wan, "Research on Network Security of Campus Network," J. Phys. Conf. Ser., vol. 1187, no. 4, p. 042113, Apr. 2019.Google ScholarGoogle ScholarCross RefCross Ref
  4. M. Cabric and M. Cabric, "Confidentiality, Integrity, and Availability," Corp. Secur. Manag., pp. 185--200, Jan. 2015.Google ScholarGoogle Scholar
  5. B. M. Gaff, "BYOD? OMG!," Computer (Long. Beach. Calif)., vol. 48, no. 2, pp. 10--11, Feb. 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Evans, "What is BYOD and why is it important?," 2013.Google ScholarGoogle Scholar
  7. D. Rodgers, "BYOD in Schools: A Beginner's Guide | Schoology," 2018. [Online]. Available: https://www.schoology.com/blog/byod-in-schools-a-beginners-guide. [Accessed: 13-Nov-2019].Google ScholarGoogle Scholar
  8. N. DuPaul, "Common Malware Types: Vulnerability Management 101 | Veracode," 2012. [Online]. Available: https://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101. [Accessed: 28-Jul-2019].Google ScholarGoogle Scholar
  9. S. Abraham, "12+ Types of Malware Explained with Examples (Complete List)," 2018. [Online]. Available: https://www.malwarefox.com/malware-types/. [Accessed: 28-Jul-2019].Google ScholarGoogle Scholar
  10. A. J. Monteclaro, "What is Spear Phishing and How is it Different than Phishing or Whaling," 2018. [Online]. Available: https://www.malwarefox.com/spear-phishing/. [Accessed: 28-Jul-2019].Google ScholarGoogle Scholar
  11. M. Rouse, "What is distributed denial of service (DDoS) attack? - Definition from WhatIs.com," 2013. [Online]. Available: https://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack. [Accessed: 28-Jul-2019].Google ScholarGoogle Scholar
  12. S. A. Lakhapati, V. Shirbhate, S. Jagtap, and A. Shrirang, "IETE Zonal Seminar 'Techno-Socio Development through Women Empowerment'-2018 Special Issue of IJECSCSE, Cross site scripting attack."Google ScholarGoogle Scholar
  13. M. Rouse, "What is SQL injection? - Definition from WhatIs.com," 2018. [Online]. Available: https://searchsoftwarequality.techtarget.com/definition/SQL-injection. [Accessed: 28-Jul-2019].Google ScholarGoogle Scholar
  14. A. A. Ahmed, A. Jantan, and M. Rasmi, "Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse," J. Netw. Syst. Manag., vol. 21, no. 2, pp. 218--237, Jun. 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. S. Tirumala, H. Sathu, and A. Sarrafzadeh, "Free and open source intrusion detection systems: A study," in 2015 International Conference on Machine Learning and Cybernetics (ICMLC), 2015, pp. 205--210.Google ScholarGoogle Scholar
  16. Comodo, "DNS Filtering | Advantages of Comodo DNS Filtering Software," 2015. [Online]. Available: https://cdome.comodo.com/dns-filtering.php. [Accessed: 29-Jul-2019].Google ScholarGoogle Scholar
  17. M. Rouse, "What is content filtering (information filtering)? - Definition from WhatIs.com," 2011. [Online]. Available: https://searchsecurity.techtarget.com/definition/content-filtering. [Accessed: 01-Aug-2019].Google ScholarGoogle Scholar
  18. D. Shinder, "News, Tips, and Advice for Technology Professionals - TechRepublic," 2011. [Online]. Available: https://www.techrepublic.com/article/pick-an-anti-virus-solution-that-will-grow-with-your-network/. [Accessed: 01-Aug-2019].Google ScholarGoogle Scholar
  19. M. Rouse, "What is deep packet inspection (DPI)? - Definition from WhatIs.com," 2017. [Online]. Available: https://searchnetworking.techtarget.com/definition/deep-packet-inspection-DPI. [Accessed: 01-Aug-2019].Google ScholarGoogle Scholar
  20. M. Heiderich et al., "Web application firewalls and client-side filters," Web Appl. Obfuscation, pp. 199--216, Jan. 2011.Google ScholarGoogle ScholarCross RefCross Ref
  21. W. Shi and M. Xie, "A Reputation-based Collaborative Approach for Spam Filtering," AASRI Procedia, vol. 5, pp. 220--227, Jan. 2013.Google ScholarGoogle ScholarCross RefCross Ref
  22. M. Karakus and A. Durresi, "Quality of Service (QoS) in Software Defined Networking (SDN): A survey," J. Netw. Comput. Appl., vol. 80, pp. 200--218, Feb. 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Kili, "The 8 Best Free Anti-Virus Programs for Linux," 2017. [Online]. Available: https://www.tecmint.com/best-antivirus-programs-for-linux/. [Accessed: 04-Aug-2019].Google ScholarGoogle Scholar
  24. M. Wilson, "ZoneAlarm Antivirus Review - Updated 2019," 2019. [Online]. Available: https://www.cloudwards.net/zonealarm-antivirus-review/. [Accessed: 04-Aug-2019].Google ScholarGoogle Scholar
  25. S. Fisher, "Comodo Antivirus Software Review," 2019. [Online]. Available: https://www.lifewire.com/comodo-antivirus-review-1356601. [Accessed: 04-Aug-2019].Google ScholarGoogle Scholar
  26. E. Geier, "THE ULTIMATE PC SECURITY TOOLBOX: EBSCOhost," 2012. [Online]. Available: http://web.a.ebscohost.com/ehost/detail/detail?vid=6&sid=abb7c736-fe52-4497-8415-2ff2a8d652df%40sdc-v-sessmgr02&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3D%3D #AN=83331423&db=ulh. [Accessed: 05-Aug-2019].Google ScholarGoogle Scholar
  27. C. Sanders, J. Smith, C. Sanders, and J. Smith, "Signature-Based Detection with Snort and Suricata," Appl. Netw. Secur. Monit., pp. 203--254, Jan. 2014.Google ScholarGoogle ScholarCross RefCross Ref
  28. C. Kumar, "5 Open Source Web Application Firewall for Better Security," 2016. [Online]. Available: https://geekflare.com/open-source-web-application-firewall/. [Accessed: 04-Aug-2019].Google ScholarGoogle Scholar
  29. "Using Squid on Solaris," Hack Proofing Sun Solaris 8, pp. 265--286, Jan. 2001.Google ScholarGoogle Scholar

Index Terms

  1. Implementing Security in a Campus Network Using Free and Open Source Solutions

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IEEA '20: Proceedings of the 2020 The 9th International Conference on Informatics, Environment, Energy and Applications
      March 2020
      138 pages
      ISBN:9781450376891
      DOI:10.1145/3386762

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 May 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader