Owing to the surfacing of new technologies which can abet easier and faster processing of data, there has been a increasing need for most organization to develop an online system. Most of these systems are developed using php programming language. This paper shows that most of these web-based systems are vulnerable to different types of attacks resulting from the disregard to security appraise during the development of the system. Security of information asset which are painstaking to any organization is one of the most important tasks which need to be safeguard regularly. Critical information infrastructure protection (CIIP) had become a lingering area of interest in the modern days of information dissemination, from the inauguration of internet to the modern elevated-profile dispersed denial-of-service assail against critical systems. Critical systems rely deeply on information communication; the interruptions of the information communication can obstruct the operation of critical systems. The western nations have advanced CIIP elucidation in place, but these elucidations are not always suitable for growing countries, where exceptional contest and necessities have to be addressed. Meanwhile, the western worlds are familiarizes with unmatched improvement of their information infrastructures. However, the lack of national CIIP efforts creates a situation for developing nations to become launch pads for cyber-attacks. In this paper, I have proposed a Network Traffic Analyzer that will analyze source codes of web based critical infrastructures and detect vulnerability in the codes for better security from attacks.
Published in | Mathematics and Computer Science (Volume 6, Issue 5) |
DOI | 10.11648/j.mcs.20210605.11 |
Page(s) | 71-76 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2021. Published by Science Publishing Group |
Critical Information Infrastructure Protection, Information Security, Vulnerabilities, Network Analyzer
[1] | Chala, D. G. (2019). College of Social Sciences (Doctoral dissertation, Addis Ababa University). |
[2] | Dyer, S. K. (2020). Human error and interactions with technology in safety-critical workplaces: Learning from the aviation industry (Doctoral dissertation, University of Illinois at Urbana-Champaign). |
[3] | Rogan, K. (2019). Anti-Intelligence: A Marxist Critique of the Smart City (Doctoral dissertation, MA Thesis in the Program of Theories of Urban Practice, Parsons School of Design, The New School, 2019: https://www. academia. edu/39125907/Antiintelligence_A_Marxist_critique_of_the_smart_city). |
[4] | Turner, H., White, J., Camelio, J. A., Williams, C., Amos, B., & Parker, R. (2015). Bad parts: Are our manufacturing systems at risk of silent cyber attacks? IEEE Security & Privacy, 13 (3), 40-47. |
[5] | Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36-49. |
[6] | Murugesan, S. (2019). The cybersecurity renaissance: security threats, risks, and safeguards. IEEE ICNL, 14 (1), 33-40. |
[7] | Lewis, T. G. (2019). Critical infrastructure protection in homeland security: defending a networked nation. John Wiley & Sons. |
[8] | Arnold, N. R., Mahoney, W. R., Derrick, D. C., Ligon, G. S., & Harms, M. M. (2015). Feasibility of a Cyber Attack on National Critical Infrastructure by a Non-State Violent Extremist Organization. Journal of Information Warfare, 14 (1), 84-100. |
[9] | Steele, W., Hussey, K., & Dovers, S. (2017). What’s critical about critical infrastructure?. Urban Policy and Research, 35 (1), 74-86. |
[10] | Garschagen, M., & Sandholz, S. (2018). The role of minimum supply and social vulnerability assessment for governing critical infrastructure failure: current gaps and future agenda. Natural Hazards and Earth System Sciences, 18 (4), 1233-1246. |
[11] | Marchetti, M., Pierazzi, F., Colajanni, M., & Guido, A. (2016). Analysis of high volumes of network traffic for advanced persistent threat detection. Computer Networks, 109, 127-141. |
[12] | Zhang, C., Patras, P., & Haddadi, H. (2019). Deep learning in mobile and wireless networking: A survey. IEEE Communications surveys & tutorials, 21 (3), 2224-2287. |
[13] | Casilari-Perez, E., & Garcia-Lagos, F. (2019). A comprehensive study on the use of artificial neural networks in wearable fall detection systems. Expert Systems with Applications, 138, 112811. |
[14] | Veeramani, R., & Rai, N. (2012, January). Windows api based malware detection and framework analysis. In International conference on networks and cyber security (Vol. 25). |
[15] | Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017, May). Applied machine learning predictive analytics to SQL injection attack detection and prevention. In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) (pp. 1087-1090). IEEE. |
[16] | Avireddy, S., Perumal, V., Gowraj, N., Kannan, R. S., Thinakaran, P., Ganapthi, S.,... & Prabhu, S. (2012, June). Random: An application specific randomized encryption algorithm to prevent SQL injection. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1327-1333). IEEE. |
[17] | Kritzinger, E., Loock, M., & Mwim, E. N. (2018, October). Cyber Safety Awareness and Culture Planning in South Africa. In International Symposium on Cyberspace Safety and Security (pp. 317-326). Springer, Cham. |
APA Style
Ibitoye Akinfola Akinrinnola, Aremu Idris Abiodun, Odesanya Oluwafunsho Idowu. (2021). Network Traffic Analysis for Enhanced Protection in Critical Information Infrastructure. Mathematics and Computer Science, 6(5), 71-76. https://doi.org/10.11648/j.mcs.20210605.11
ACS Style
Ibitoye Akinfola Akinrinnola; Aremu Idris Abiodun; Odesanya Oluwafunsho Idowu. Network Traffic Analysis for Enhanced Protection in Critical Information Infrastructure. Math. Comput. Sci. 2021, 6(5), 71-76. doi: 10.11648/j.mcs.20210605.11
AMA Style
Ibitoye Akinfola Akinrinnola, Aremu Idris Abiodun, Odesanya Oluwafunsho Idowu. Network Traffic Analysis for Enhanced Protection in Critical Information Infrastructure. Math Comput Sci. 2021;6(5):71-76. doi: 10.11648/j.mcs.20210605.11
@article{10.11648/j.mcs.20210605.11, author = {Ibitoye Akinfola Akinrinnola and Aremu Idris Abiodun and Odesanya Oluwafunsho Idowu}, title = {Network Traffic Analysis for Enhanced Protection in Critical Information Infrastructure}, journal = {Mathematics and Computer Science}, volume = {6}, number = {5}, pages = {71-76}, doi = {10.11648/j.mcs.20210605.11}, url = {https://doi.org/10.11648/j.mcs.20210605.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.mcs.20210605.11}, abstract = {Owing to the surfacing of new technologies which can abet easier and faster processing of data, there has been a increasing need for most organization to develop an online system. Most of these systems are developed using php programming language. This paper shows that most of these web-based systems are vulnerable to different types of attacks resulting from the disregard to security appraise during the development of the system. Security of information asset which are painstaking to any organization is one of the most important tasks which need to be safeguard regularly. Critical information infrastructure protection (CIIP) had become a lingering area of interest in the modern days of information dissemination, from the inauguration of internet to the modern elevated-profile dispersed denial-of-service assail against critical systems. Critical systems rely deeply on information communication; the interruptions of the information communication can obstruct the operation of critical systems. The western nations have advanced CIIP elucidation in place, but these elucidations are not always suitable for growing countries, where exceptional contest and necessities have to be addressed. Meanwhile, the western worlds are familiarizes with unmatched improvement of their information infrastructures. However, the lack of national CIIP efforts creates a situation for developing nations to become launch pads for cyber-attacks. In this paper, I have proposed a Network Traffic Analyzer that will analyze source codes of web based critical infrastructures and detect vulnerability in the codes for better security from attacks.}, year = {2021} }
TY - JOUR T1 - Network Traffic Analysis for Enhanced Protection in Critical Information Infrastructure AU - Ibitoye Akinfola Akinrinnola AU - Aremu Idris Abiodun AU - Odesanya Oluwafunsho Idowu Y1 - 2021/10/28 PY - 2021 N1 - https://doi.org/10.11648/j.mcs.20210605.11 DO - 10.11648/j.mcs.20210605.11 T2 - Mathematics and Computer Science JF - Mathematics and Computer Science JO - Mathematics and Computer Science SP - 71 EP - 76 PB - Science Publishing Group SN - 2575-6028 UR - https://doi.org/10.11648/j.mcs.20210605.11 AB - Owing to the surfacing of new technologies which can abet easier and faster processing of data, there has been a increasing need for most organization to develop an online system. Most of these systems are developed using php programming language. This paper shows that most of these web-based systems are vulnerable to different types of attacks resulting from the disregard to security appraise during the development of the system. Security of information asset which are painstaking to any organization is one of the most important tasks which need to be safeguard regularly. Critical information infrastructure protection (CIIP) had become a lingering area of interest in the modern days of information dissemination, from the inauguration of internet to the modern elevated-profile dispersed denial-of-service assail against critical systems. Critical systems rely deeply on information communication; the interruptions of the information communication can obstruct the operation of critical systems. The western nations have advanced CIIP elucidation in place, but these elucidations are not always suitable for growing countries, where exceptional contest and necessities have to be addressed. Meanwhile, the western worlds are familiarizes with unmatched improvement of their information infrastructures. However, the lack of national CIIP efforts creates a situation for developing nations to become launch pads for cyber-attacks. In this paper, I have proposed a Network Traffic Analyzer that will analyze source codes of web based critical infrastructures and detect vulnerability in the codes for better security from attacks. VL - 6 IS - 5 ER -