Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/6261
Full metadata record
DC FieldValueLanguage
dc.contributor.authorIsah, Abdulkadir Onivehu-
dc.contributor.authorAlhassan, J. K.-
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorAdebayo, Olawale Surajudeen-
dc.date.accessioned2021-07-03T22:06:29Z-
dc.date.available2021-07-03T22:06:29Z-
dc.date.issued2020-09-
dc.identifier.issn2054-7420-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/6261-
dc.description.abstractTracking of computer network system attacks is a proactive measure to protect against attacks on data, that are basically encrypted for confidential security reasons, while in transit on the computer information channel. Cyber security threat continues to increase in direct proportion to the rate at which internet based services are deployed. In this systematic review, 53 research papers from reputable publishers were downloaded out of which 41 papers that are closely related to tracking of malicious attackers on encrypted data online were review under the consideration of attacks on encrypted data, and tracking malicious attacks; with respect to proposed technique, problem addressed, comparison to existing methodology, parameters used, major findings and then limitations and future knowledge. The authors then deduce the classification of four varying types of attacks (Keyword Guessing Attack, Selective opening attacks, Leakage-Abuse Attacks, and Key Reinstallation Attacks) from the review, to narrow down research into the future countermeasures for these attacks. 11 research papers actual discuss countermeasures for these classification types, with Keyword Guessing Attack being the focus of 6 research work, Selective Opening Attacks have 3 papers trying to solve vulnerabilities permitting such attacks, 2 papers aimed research solutions at Leakage-Abuse Attacks, and Key Reinstallation Attacks, has mention but none of the papers reviewed proffer mitigation techniques. The remaining 30 papers concentrated discussions on general attacks on encrypted data. Inclining future research attention to the four kinds of attacks against encrypted data will improve attack detection contrary to the commonly post mortem approach.en_US
dc.language.isoenen_US
dc.publisherTransactions on Networks and Communicationsen_US
dc.subjectEncryption, Network, Vulnerabilities, Attack, Countermeasures, Security.en_US
dc.titleTracking of Malicious Attacks on Data Online: A Systematic Reviewen_US
dc.typeArticleen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
Tracking of Malicious Attack on Data online.pdf61.9 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.