14,870
Views
16
CrossRef citations to date
0
Altmetric
Short Communication

Network security – an updated perspective

&
Pages 325-334 | Received 21 Oct 2013, Accepted 15 Feb 2014, Published online: 17 Apr 2014

References

  • Cert (2012). Cert/cc statistics. http://www.cert.org/stats/
  • CheckPoint (2013). Check point 2013 security report January (2013). Retrieved September 23, 2013, from http://www.checkpoint.com/campaigns/security-report/.
  • Conrad, J. (2012). Seeking help: The important role of ethical hackers. Network Security, 8, 5–8. doi: 10.1016/S1353-4858(12)70071-5
  • Denman, S. (2012). Why multi-layered security is still the best defence. Network Security, 3, 5–7. doi: 10.1016/S1353-4858(12)70043-0
  • Goodchild, J. (2010). Study: Advanced threats a growing problem for security. PCWorld, 30 June 2010. Retrieved September 23, 2013, from http://www.pcworld.com/businesscenter/article/200224/study-_advanced_threats_a_growing_problem_for_security.html
  • Hilbert, E. (2013). Living with cybercrime. Network Security, 11, 15–17. doi: 10.1016/S1353-4858(13)70126-0
  • Kim, Y., Kim, I., & Park, N. (2014). Analysis of cyber attacks and security intelligence. In James J. (Jong Hyuk) Park, H. Adeli, N. Park & I. Woungang (Eds.), Mobile, ubiquitous, and intelligent computing, Lecture Notes in Electrical Engineering, Vol. 274 (pp. 489–494). Berlin, Heidelberg: Springer.
  • Kumar, G., & Kumar, K. (2011, July 21–22). AI based supervised classifiers: An analysis for intrusion detection. In A. Mantri & M. Khurana (Eds.), Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, Rajpura, Punjab (pp. 170–174). New York: ACM.
  • Kumar, G., & Kumar, K. (2012). An information theoretic approach for feature selection. Security and Communication Networks, 5(2), 178–185. doi: 10.1002/sec.303
  • Kumar, G., Kumar, K., & Sachdeva, M. (2010a). The use of artificial intelligence based techniques for intrusion detection: A review. Artificial Intelligence Review 34(4), 369–387. doi: 10.1007/s10462-010-9179-5
  • Kumar, G., Kumar, K., & Sachdeva, M. (2010b). An empirical comparative analysis of feature reduction methods for intrusion detection. International Journal of Information and Telecommunication Technology, 1(1), 44–51.
  • PandaLabs (2012). 2012 annual report pandalabs. Retrieved September 23, 2013, form http://press.pandasecurity.com/wp-content/uploads/2013/02/PandaLabs-Annual-Report-2012.pdf.
  • PandaLabs (2013). Pandalabs quarterly report January – March 2013. Retrieved September 23, 2013, form http://press.pandasecurity.com/wp-content/uploads/2010/05/PandaLabs-Quaterly-Report.pdf
  • Patcha, A., & Park, J. M. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12), 3448–3470. doi: 10.1016/j.comnet.2007.02.001
  • Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys (CSUR), 39(1), Article 3. doi: 10.1145/1216370.1216373
  • Potts, M. (2012). The state of information security. Network Security, 2012(7), 9–11. doi: 10.1016/S1353-4858(12)70064-8
  • Ramamohanarao, K., Gupta, K., Peng, T., & Leckie, C. (2007, December 16–20). The curse of ease of access to the internet. In P. McDaniel & S. K. Gupta (Eds.), Information Systems Security, Third International Conference, ICISS 2007 Proceedings, Delhi (pp. 234–249). Berlin Heidelberg: Springer.
  • Sachdeva, M., Kumar, K., Singh, G., & Singh, K. (2009, March 6–7). Performance analysis of web service under ddos attacks. Proceedings of International Advance Computing Conference (IACC), Patiala, India (pp. 1002–1007). New York: IEEE.
  • Schneider, D. (2012). The state of network security. Network Security, 2012(2), 14–20. doi: 10.1016/S1353-4858(12)70016-8
  • Shakarian, P., Shakarian, J., & Ruef, A. (2013). Introduction to cyber-warfare: A multidisciplinary approach. Maryland Heights: Syngress Publishing.
  • Verizon (2012). The 2012 data breach investigations report. Ret-rieved September 23, 2013, from http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf
  • Verizon (2013). The 2013 data breach investigations report. Retrieved September 23, 2013, from http://www.verizonenterprise.com/resources/reports/rp_data-_breach-investigations-report-2013_en_xg.pdf
  • Virvilis, N., & Gritzalis, D. (2013, September 2–6). The big four-what we did wrong in advanced persistent threat detection? Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, Regensburg (pp. 248–254). New York: IEEE.