2319 883
Full Length Article
Journal of Cybersecurity and Information Management
Volume 8 , Issue 1, PP: 35-41 , 2021 | Cite this article as | XML |PDF

Title

Cybersecurity in Networking Devices

  Afroj Jahan Badhon 1 * ,   Dr. Shruti Aggarwal 2

1  Department of CSE, Chandigarh University, Punjub, India
    (afrojjahan29@gmail.com)

2  Department of CSE, Chandigarh University, Punjub, India
    (drshruti.cse@gmail.com)


Doi   :   https://doi.org/10.54216/JCIM.080104

Received: May 12, 2021 Accepted: September 20, 2021

Abstract :

Cybersecurity is training defensive arrangements, systems, and plans to save the information from cyber outbreaks. These virtual outbreaks are typically intended to retrieve, alter, or otherwise extinguish delicate data, extracting currency from manipulators, or disturb usual commercial procedures. System Security defends one’s system and information from breaks, interruptions also other intimidations. Network Security contains admission controller, computer virus and defiant computer virus software program, system safety, system analytics, system-connected protection categories, firewalls, and VPN encoding. System substructure strategies stand the mechanisms of a net that conveyance transportations desired intended for information, submissions, facilities, and multimedia. In this paper, we reflect on Cybersecurity in Networking Devices. 

Keywords :

Cybersecurity , Networking , Cyber attack , Digital Devices

References :

 

[1]       P. Singh and S. Aggarwal, “Software Fault Prediction Using Hybrid Swarm Intelligent Cuckoo and Bat based k-means++ Clustering Technique,” Int. J. Adv. Intell. Paradig., vol. 20, no. 1/2, p. 1, 2021, doi: 10.1504/IJAIP.2021.10016288.

[2]           “cyber security and networking (All Fields) – 945 – Web of Science Core Collection.” https://www.webofscience.com/wos/woscc/summary/282ef541-cc4e-4ad7-b719-d27d465c7388-096978be/relevance/1 (accessed Sep. 22, 2021).

[3]           K. Cabaj, P. Z. Órawski, P. Nowakowski, M. Purski, and W. Mazurczyk, “Efficient distributed network covert channels for internet of things environments,” J. Cybersecurity, vol. 6, no. 1, pp. 1–18, 2020, doi: 10.1093/CYBSEC/TYAA018.

[4]           K. S. H. Ramos, M. A. S. Monge, and J. M. Vidal, “Benchmark-based reference model for evaluating botnet detection tools driven by traffic-flow analytics,” Sensors (Switzerland), vol. 20, no. 16, pp. 1–31, 2020, doi: 10.3390/s20164501.

[5]           B. Xu, M. Lu, H. Zhang, and C. Pan, “A novel multi-agent model for robustness with component failure and malware propagation in wireless sensor networks,” Sensors, vol. 21, no. 14, 2021, doi: 10.3390/s21144873.

[6]           R. Y. Patil and S. R. Devane, “Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime,” J. King Saud Univ. - Comput. Inf. Sci., Dec. 2019, doi: 10.1016/J.JKSUCI.2019.11.016.

[7]           S. Aggarwal and P. Singh, “Cuckoo and krill herd-based k-means++ hybrid algorithms for clustering,” Expert Syst., vol. 36, no. 4, 2019, doi: 10.1111/EXSY.12353.

[8]           P. Dymora and M. Mazure, “An innovative approach to anomaly detection in communication networks using multifractal analysis,” Appl. Sci., vol. 10, no. 9, 2020, doi: 10.3390/app10093277.

[9]           H. Bai, G. Liu, W. Liu, Y. Quan, and S. Huang, “N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection,” Secur. Commun. Networks, vol. 2021, 2021, doi: 10.1155/2021/5599556.

[10]         N. Elisa, L. Yang, F. Chao, and Y. Cao, “A framework of blockchain-based secure and privacy-preserving E-government system,” Wirel. Networks, vol. 0, 2020, doi: 10.1007/s11276-018-1883-0.

[11]         S. Aggarwal and P. Singh, “Cuckoo, Bat and Krill Herd based k-means++ clustering algorithms,” Cluster Comput., vol. 22, pp. 14169–14180, Nov. 2019, doi: 10.1007/S10586-018-2262-4.

[12]         P. Eder-Neuhauser, T. Zseby, and J. Fabini, “Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types,” J. Comput. Virol. Hacking Tech., vol. 15, no. 2, pp. 109–125, 2019, doi: 10.1007/s11416-018-0325-y.

 [13]    Monica Sood, et.al.“Optimal Path Planning using Swarm Intelligence based Hybrid Techniques” Journal of computational and theoretical nanoscience (JCTN), ASPBS publisher. Vol. 16 No. 9, 2019, pp. 3717–3727, DOI:10.1166/jctn.2019.8240.

[14]         A. Hussain et al., "A Resource Efficient hybrid Proxy Mobile IPv6 extension for Next Generation IoT Networks," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3058982.

[15]     M. Kumar, P. Mukherjee, K. Verma, S. Verma and D. B. Rawat, "Improved Deep Convolutional Neural Network based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks," in IEEE Transactions on Network Science and Engineering, doi: 10.1109/TNSE.2021.3098011.

[16]     P. Rani, Kavita, S. Verma and G. N. Nguyen, "Mitigation of Black Hole and Gray Hole Attack Using Swarm Inspired Algorithm with Artificial Neural Network," in IEEE Access, vol. 8, pp. 121755-121764, 2020, doi: 10.1109/ACCESS.2020.3004692.

[17]       Loveleen Gaur, Gurmeet Singh, Arun Solanki, Noor Zaman Jhanjhi, Ujwal Bhatia, Shavneet Sharma, Sahil Verma, Kavita, Nataša Petrović, Muhammad Fazal Ijaz, and Wonjoon Kim, Disposition of Youth in Predicting Sustainable Development Goals Using the Neuro-fuzzy and Random Forest Algorithms, Article number: 11:24 (2021) 

[18]       Lv, Z.; Qiao, L.; Verma, S.; Kavita. AI-enabled IoT-Edge Data Analytics for Connected Living. ACM Trans. Internet Technol. 2021, 21, 1–20. https://doi.org/10.1145/3421510

[19]         Arora M., Verma S., Kavita, Chopra S. (2020) A Systematic Literature Review of Machine Learning Estimation Approaches in Scrum Projects. In: Mallick P., Balas V., Bhoi A., Chae GS. (eds) Cognitive Informatics and Soft Computing. Advances in Intelligent Systems and Computing, vol 1040. Springer, Singapore. https://doi.org/10.1007/978-981-15-1451-7_59

[20]         Sowjanya Ramisetty, Kavita and Sahil Verma, “The Amalgamative Sharp WSN Routing and with Enhanced Machine Learning Journal of computational and theoretical nanoscience (JCTN), ASPBS publisher. Vol. 16 No. 9, 2019, pp. 3766–3769 , DOI: 10.1166/jctn.2019.8247

 

 

 


Cite this Article as :
Style #
MLA Afroj Jahan Badhon , Dr. Shruti Aggarwal. "Cybersecurity in Networking Devices." Journal of Cybersecurity and Information Management, Vol. 8, No. 1, 2021 ,PP. 35-41 (Doi   :  https://doi.org/10.54216/JCIM.080104)
APA Afroj Jahan Badhon , Dr. Shruti Aggarwal. (2021). Cybersecurity in Networking Devices. Journal of Journal of Cybersecurity and Information Management, 8 ( 1 ), 35-41 (Doi   :  https://doi.org/10.54216/JCIM.080104)
Chicago Afroj Jahan Badhon , Dr. Shruti Aggarwal. "Cybersecurity in Networking Devices." Journal of Journal of Cybersecurity and Information Management, 8 no. 1 (2021): 35-41 (Doi   :  https://doi.org/10.54216/JCIM.080104)
Harvard Afroj Jahan Badhon , Dr. Shruti Aggarwal. (2021). Cybersecurity in Networking Devices. Journal of Journal of Cybersecurity and Information Management, 8 ( 1 ), 35-41 (Doi   :  https://doi.org/10.54216/JCIM.080104)
Vancouver Afroj Jahan Badhon , Dr. Shruti Aggarwal. Cybersecurity in Networking Devices. Journal of Journal of Cybersecurity and Information Management, (2021); 8 ( 1 ): 35-41 (Doi   :  https://doi.org/10.54216/JCIM.080104)
IEEE Afroj Jahan Badhon, Dr. Shruti Aggarwal, Cybersecurity in Networking Devices, Journal of Journal of Cybersecurity and Information Management, Vol. 8 , No. 1 , (2021) : 35-41 (Doi   :  https://doi.org/10.54216/JCIM.080104)