ABSTRACT
Network security is a very important concern that higher education institutions' administrators should carefully implement and supervise. There are lots technologies, innovations, current trends and other advancements that pose a great benefit but also equally constitutes emerging threats such as the implementations of Bring Your Own Device (BYOD) where regulations are still unclear. As part of the concept on the network security implementation, the CIA triad was tackled which concerns about confidentiality, integrity and availability of data and information. The conduct of this study used a literature review about network underlying threats. After identifying the underlying network threats, a thorough discussion on the available preventive measures that combat network security threats were carried out. After which, the free and open source technologies were included. The study concludes that with a very wide array of network threats, there are available free and open source solutions for network security threats and it is recommended to have these all enabled to prevent network-related damages.
- J. Fruhlinger, "What is network security? Definition, methods, jobs & salaries | CSO Online," 2018. [Online]. Available: https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-jobs-and-salaries.html. [Accessed: 02-Aug-2019].Google Scholar
- Comodo, "What Is Network Security? | Meaning and Types of Network Security," 2019. [Online]. Available: https://enterprise.comodo.com/blog/what-is-network-security/. [Accessed: 28-Jul-2019].Google Scholar
- M. Huang, W. Luo, and X. Wan, "Research on Network Security of Campus Network," J. Phys. Conf. Ser., vol. 1187, no. 4, p. 042113, Apr. 2019.Google ScholarCross Ref
- M. Cabric and M. Cabric, "Confidentiality, Integrity, and Availability," Corp. Secur. Manag., pp. 185--200, Jan. 2015.Google Scholar
- B. M. Gaff, "BYOD? OMG!," Computer (Long. Beach. Calif)., vol. 48, no. 2, pp. 10--11, Feb. 2015.Google ScholarDigital Library
- D. Evans, "What is BYOD and why is it important?," 2013.Google Scholar
- D. Rodgers, "BYOD in Schools: A Beginner's Guide | Schoology," 2018. [Online]. Available: https://www.schoology.com/blog/byod-in-schools-a-beginners-guide. [Accessed: 13-Nov-2019].Google Scholar
- N. DuPaul, "Common Malware Types: Vulnerability Management 101 | Veracode," 2012. [Online]. Available: https://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101. [Accessed: 28-Jul-2019].Google Scholar
- S. Abraham, "12+ Types of Malware Explained with Examples (Complete List)," 2018. [Online]. Available: https://www.malwarefox.com/malware-types/. [Accessed: 28-Jul-2019].Google Scholar
- A. J. Monteclaro, "What is Spear Phishing and How is it Different than Phishing or Whaling," 2018. [Online]. Available: https://www.malwarefox.com/spear-phishing/. [Accessed: 28-Jul-2019].Google Scholar
- M. Rouse, "What is distributed denial of service (DDoS) attack? - Definition from WhatIs.com," 2013. [Online]. Available: https://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack. [Accessed: 28-Jul-2019].Google Scholar
- S. A. Lakhapati, V. Shirbhate, S. Jagtap, and A. Shrirang, "IETE Zonal Seminar 'Techno-Socio Development through Women Empowerment'-2018 Special Issue of IJECSCSE, Cross site scripting attack."Google Scholar
- M. Rouse, "What is SQL injection? - Definition from WhatIs.com," 2018. [Online]. Available: https://searchsoftwarequality.techtarget.com/definition/SQL-injection. [Accessed: 28-Jul-2019].Google Scholar
- A. A. Ahmed, A. Jantan, and M. Rasmi, "Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse," J. Netw. Syst. Manag., vol. 21, no. 2, pp. 218--237, Jun. 2013.Google ScholarDigital Library
- S. S. Tirumala, H. Sathu, and A. Sarrafzadeh, "Free and open source intrusion detection systems: A study," in 2015 International Conference on Machine Learning and Cybernetics (ICMLC), 2015, pp. 205--210.Google Scholar
- Comodo, "DNS Filtering | Advantages of Comodo DNS Filtering Software," 2015. [Online]. Available: https://cdome.comodo.com/dns-filtering.php. [Accessed: 29-Jul-2019].Google Scholar
- M. Rouse, "What is content filtering (information filtering)? - Definition from WhatIs.com," 2011. [Online]. Available: https://searchsecurity.techtarget.com/definition/content-filtering. [Accessed: 01-Aug-2019].Google Scholar
- D. Shinder, "News, Tips, and Advice for Technology Professionals - TechRepublic," 2011. [Online]. Available: https://www.techrepublic.com/article/pick-an-anti-virus-solution-that-will-grow-with-your-network/. [Accessed: 01-Aug-2019].Google Scholar
- M. Rouse, "What is deep packet inspection (DPI)? - Definition from WhatIs.com," 2017. [Online]. Available: https://searchnetworking.techtarget.com/definition/deep-packet-inspection-DPI. [Accessed: 01-Aug-2019].Google Scholar
- M. Heiderich et al., "Web application firewalls and client-side filters," Web Appl. Obfuscation, pp. 199--216, Jan. 2011.Google ScholarCross Ref
- W. Shi and M. Xie, "A Reputation-based Collaborative Approach for Spam Filtering," AASRI Procedia, vol. 5, pp. 220--227, Jan. 2013.Google ScholarCross Ref
- M. Karakus and A. Durresi, "Quality of Service (QoS) in Software Defined Networking (SDN): A survey," J. Netw. Comput. Appl., vol. 80, pp. 200--218, Feb. 2017.Google ScholarDigital Library
- A. Kili, "The 8 Best Free Anti-Virus Programs for Linux," 2017. [Online]. Available: https://www.tecmint.com/best-antivirus-programs-for-linux/. [Accessed: 04-Aug-2019].Google Scholar
- M. Wilson, "ZoneAlarm Antivirus Review - Updated 2019," 2019. [Online]. Available: https://www.cloudwards.net/zonealarm-antivirus-review/. [Accessed: 04-Aug-2019].Google Scholar
- S. Fisher, "Comodo Antivirus Software Review," 2019. [Online]. Available: https://www.lifewire.com/comodo-antivirus-review-1356601. [Accessed: 04-Aug-2019].Google Scholar
- E. Geier, "THE ULTIMATE PC SECURITY TOOLBOX: EBSCOhost," 2012. [Online]. Available: http://web.a.ebscohost.com/ehost/detail/detail?vid=6&sid=abb7c736-fe52-4497-8415-2ff2a8d652df%40sdc-v-sessmgr02&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3D%3D #AN=83331423&db=ulh. [Accessed: 05-Aug-2019].Google Scholar
- C. Sanders, J. Smith, C. Sanders, and J. Smith, "Signature-Based Detection with Snort and Suricata," Appl. Netw. Secur. Monit., pp. 203--254, Jan. 2014.Google ScholarCross Ref
- C. Kumar, "5 Open Source Web Application Firewall for Better Security," 2016. [Online]. Available: https://geekflare.com/open-source-web-application-firewall/. [Accessed: 04-Aug-2019].Google Scholar
- "Using Squid on Solaris," Hack Proofing Sun Solaris 8, pp. 265--286, Jan. 2001.Google Scholar
Index Terms
- Implementing Security in a Campus Network Using Free and Open Source Solutions
Recommendations
Secure Campus Network System with Automatic Isolation of High Security Risk Device
SIGUCCS '18: Proceedings of the 2018 ACM SIGUCCS Annual ConferenceIn recent years, there are many problems of network security such data breaches and unauthorized access due to targeted attacks on vulnerabilities. The campus network in a university is under various threats as well as corporate networks. In addition, ...
Research on Campus Network Security Problem and Protection Strategy
With the "Internet +" era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the ...
Research on Intrusion Detection Algorithm Based on Smart Campus Network Security
ICASIT 2020: Proceedings of the 2020 International Conference on Aviation Safety and Information TechnologyThe university smart campus network is an open network; campus network bandwidth is generally high Used to meet modern teaching requirements. But the college user group is relatively active, which provides a favorable environment for hackers to invade. ...
Comments