Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/6215
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsah, Abdulkadir O.-
dc.contributor.authorAlhassan, John K-
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorAdebayo, Olawale Surajudeen-
dc.date.accessioned2021-07-03T17:55:45Z-
dc.date.available2021-07-03T17:55:45Z-
dc.date.issued2020-
dc.identifier.issn2054 -7420-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/6215-
dc.description.abstractTracking of computer network system attacks is a proactive measure to protect against attacks on data, that are basically encrypted for confidential security reasons, while in transit on the computer information channel. Cyber security threat continues to increase in direct proportion to the rate at which internet based services are deployed. In this systematic review, 53 research papers from reputable publishers were downloaded out of which 41 papers that are closely related to tracking of malicious attackers on encrypted data online were review under the consideration of attacks on encrypted data, and tracking malicious attacks; with respect to proposed technique, problem addressed, comparison to existing methodology, parameters used, major findings and then limitations and future knowledge. The authors then deduce the classification of four varying types of attacks (Keyword Guessing Attack, Selective opening attacks, Leakage-Abuse Attacks, and Key Reinstallation Attacks) from the review, to narrow down research into the future countermeasures for these attacks. 11 research papers actual discuss countermeasures for these classification types, with Keyword Guessing Attack being the focus of 6 research work, Selective Opening Attacks have 3 papers trying to solve vulnerabilities permitting such attacks, 2 papers aimed research solutions at Leakage-Abuse Attacks, and Key Reinstallation Attacks, has mention but none of the papers reviewed proffer mitigation techniques. The remaining 30 papers concentrated discussions on general attacks on encrypted data. Inclining future research attention to the four kinds of attacks against encrypted data will improve attack detection contrary to the commonly post- mortem approachen_US
dc.language.isoenen_US
dc.publisherTransactions and Networks on Communicationsen_US
dc.relation.ispartofseriesVolume 8;4-
dc.subjectEncryptionen_US
dc.subjectCountermeasuresen_US
dc.subjectNetworken_US
dc.subjectVulnerabilitiesen_US
dc.subjectAttacken_US
dc.subjectSecurityen_US
dc.titleTracking of Malicious Attacks on Data Online: A Systematic Reviewen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
TNC 9463.pdf365.19 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.