Originally it was assumed that with the importance of

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: . FUTURE TRENDS IN SECURITY What is going to drive the Internet security is the set of applications more than anything else. The future will possibly be that the security is similar to an immune system. The immune system fights off attacks and builds itself to fight tougher enemies. Similarly, the network security will be able to function as an immune system. The trend towards biometrics could have taken place a while ago, but it seems that it isn’t being actively pursued. Many security developments that are taking place are within the same set of security technology that is being used today with some minor adjustments. CONCLUSION Network security is an important field that is increasingly gaining attention as the internet expands. The security threats and internet protocol were analyzed to determine the necessary security technology. The security technology is mostly software based, but many common hardware devices are used. The current development in network security is not very impressive. Originally it was assumed that with the importance of the network security field, new approaches to security, both hardware and software, would be actively researched. It was a surprise to see most of the development taking place in the same technologies being currently used. The embedded security of the new internet protocol IPv6 may provide many benefits to internet users. Although some security issues were observed, the IPv6 internet protocol seems to evade many of the current popular attacks. Combined use of IPv6 and security tools such as firewalls, intrusion detection, and authentication mechanisms will prove effective in guarding intellectual property for the near future. The network security field may have to evolve more rapidly to deal with the threats further in the future. REFERENCES [1] Dowd, P.W.; McHenry, J.T., "Network security: it's time to take it seriously," Computer, vol.31, no.9, pp.24‐ 28, Sep 1998 [2] Kartalopoulos, S. V., "Differentiating Data Security and Network Security," Communications, 2008. ICC '08. IEEE International Conference on, pp.1469‐1473, 19‐23 May 2008 [3] “Security Overview,” www.redhat.com/docs/manuals/enterprise/RHEL‐4‐ Manual/security‐guide/ch‐sgs‐ov.html. [4] Molva, R., Institut Eurecom,“Internet Security Architecture,” in Computer Networks & ISDN Systems Journal, vol. 31, pp. 787‐804, April 1999 1 2 [5] Sotillo, S., East Carolina University, “IPv6 security issues,” August 2006, www.infosecwriters.com/text_resources/pdf/IPv6_SSot illo.pdf. [6] Andress J., “IPv6: the next internet protocol,” April 2005, www.usenix.com/publications/login/2005‐ 04/pdfs/andress0504.pdf. [7] Warfield M., “Security Implications of IPv6,” Internet Security Systems White Paper, documents.iss.net/whitepapers/IPv6.pdf [8] Adeyinka, O., "Internet Attack Methods and Internet Security Technology," Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on, vol., no., pp.77‐82, 13‐15 May 2008 [9] Marin, G.A., "Network security basics," Security & Privacy, IEEE , vol.3, no.6, pp. 68‐72, Nov.‐Dec. 2005 [10] “Internet History Timeline,” www3.baylor.edu/~Sharon_P_Johnson/etg/inthistory.h tm. [11] Landwehr, C.E.; Goldschlag, D.M., "Security issues in networks with Internet access," Proceedings of the IEEE, vol.85, no.12, pp.2034‐2051, Dec 1997 [12] "Intranet." Wikipedia, The Free Encyclopedia. 23 Jun 2008, 10:43 UTC. Wikimedia Foundation, Inc. 2 Jul 2008 <http://en.wikipedia.org/w/index.php?title=Intranet&ol did=221174244>. [13] "Virtual private network." Wikipedia, The Free Encyclopedia. 30 Jun 2008, 19:32 UTC. Wikimedia Foundation, Inc. 2 Jul 2008 <http://en.wikipedia.org/w/index.php?title=Virtual_priv ate_network&oldid=222715612>. [14] Tyson, J., ”How Virtual private networks work,” http://www.howstuffworks.com/vpn.htm . [15] Al‐Salqan, Y.Y., "Future trends in Internet security," Distributed Computing Systems, 1997., Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of , vol., no., pp.216‐217, 29‐31 Oct 1997 [16]Curtin, M. “Introduction to Network Security,” http://www.interhack.net/pubs/network‐security. [17] “Improving Security,” http://www.cert.org/tech_tips, 2006. [18] Serpanos, D.N.; Voyiatzis, A.G., "Secure network design: A layered approach," Autonomous Decentralized System, 2002. The 2nd International Workshop on, vol., no., pp. 95‐100, 6‐7 Nov. 2002 [19] Ohta, T.; Chikaraishi, T., "Network security model," Networks, 1993. International Conference on Information Engineering '93. 'Communications and Networks for the Year 2000', Proceedings of IEEE Singapore International Conference on , vol.2, no., pp.507‐511 vol.2, 6‐11 Sep 1993 1 3...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online