scispace - formally typeset
Search or ask a question
Topic

Internet security

About: Internet security is a research topic. Over the lifetime, 5375 publications have been published within this topic receiving 112993 citations. The topic is also known as: operation security.


Papers
More filters
Proceedings ArticleDOI
01 Dec 2015
TL;DR: An overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT is presented.
Abstract: The paper presents a survey and analysis on the current status and concerns of Internet of things (IoT) security. The IoT framework aspires to connect anyone with anything at anywhere. IoT typically has a three layers architecture consisting of Perception, Network, and Application layers. A number of security principles should be enforced at each layer to achieve a secure IoT realization. The future of IoT framework can only be ensured if the security issues associated with it are addressed and resolved. Many researchers have attempted to address the security concerns specific to IoT layers and devices by implementing corresponding countermeasures. This paper presents an overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT.

518 citations

Journal ArticleDOI
TL;DR: The author looks at the collection of standards that make up TLS, including its history, protocol, and future, for securing client-server communications over the Internet.
Abstract: Transport Layer Security is the standard, widely deployed protocol for securing client-server communications over the Internet. TLS is designed to prevent eavesdropping, tampering, and message forgery for client-server applications. Here, the author looks at the collection of standards that make up TLS, including its history, protocol, and future.

508 citations

Proceedings ArticleDOI
07 Aug 2001
TL;DR: This work examines the requirements of Grid portals, gives an overview of the GSI, and demonstrates how MyProxy enables them to function together, using an online credentials repository system, called MyProxy.
Abstract: Grid portals, based on standard Web technologies, are increasingly used to provide user interfaces for computational and data grids. However, such Grid portals do not integrate cleanly with existing Grid security systems such as the Grid Security Infrastructure (GSI), due to lack of delegation capabilities in Web security mechanisms. We solve this problem using an online credentials repository system, called MyProxy. MyProxy allows Grid portals to use the GSI to interact with Grid resources in a standard, secure manner. We examine the requirements of Grid portals, give an overview of the GSI, and demonstrate how MyProxy enables them to function together. The architecture and security of the MyProxy system are described in detail.

488 citations

01 Jan 1998
TL;DR: The Internet Security Association and Key Management Protocol (ISAKMP) as discussed by the authors is a key management protocol that allows the creation and management of security associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks).
Abstract: This memo describes a protocol utilizing security concepts necessary for establishing Security Associations (SA) and cryptographic keys in an Internet environment. A Security Association protocol that negotiates, establishes, modifies and deletes Security Associations and their attributes is required for an evolving Internet, where there will be numerous security mechanisms and several options for each security mechanism. The key management protocol must be robust in order to handle public key generation for the Internet community at large and private key requirements for those private networks with that requirement. The Internet Security Association and Key Management Protocol (ISAKMP) defines the procedures for authenticating a communicating peer, creation and management of Security Associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks). All of these are necessary to establish and maintain secure communications (via IP Security Service or any other security protocol) in an Internet environment.

450 citations

Journal ArticleDOI
TL;DR: A novel method that used deep learning to improve the detection of malware variants using a convolutional neural network that could extract the features of the malware images automatically was proposed.
Abstract: With the development of the Internet, malicious code attacks have increased exponentially, with malicious code variants ranking as a key threat to Internet security. The ability to detect variants of malicious code is critical for protection against security breaches, data theft, and other dangers. Current methods for recognizing malicious code have demonstrated poor detection accuracy and low detection speeds. This paper proposed a novel method that used deep learning to improve the detection of malware variants. In prior research, deep learning demonstrated excellent performance in image recognition. To implement our proposed detection method, we converted the malicious code into grayscale images. Then, the images were identified and classified using a convolutional neural network (CNN) that could extract the features of the malware images automatically. In addition, we utilized a bat algorithm to address the data imbalance among different malware families. To test our approach, we conducted a series of experiments on malware image data from Vision Research Lab. The experimental results demonstrated that our model achieved good accuracy and speed as compared with other malware detection models.

444 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
85% related
Mobile computing
51.3K papers, 1M citations
84% related
The Internet
213.2K papers, 3.8M citations
84% related
Network packet
159.7K papers, 2.2M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202314
202233
2021144
2020180
2019183
2018185