DOI QR코드

DOI QR Code

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data (Department of Information Technology, School of Informatics, Wolaita Sodo University)
  • Received : 2023.10.05
  • Published : 2023.10.30

Abstract

The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

Keywords

References

  1. M. Al-Zoube, S. Abou El-Seoud, and M. F. Wyne, "Cloud computing based e-learning system," Int. J. Distance Educ. Technol. IJDET, vol. 8, no. 2, pp. 58-71, 2010. https://doi.org/10.4018/jdet.2010040105
  2. M. J. Kavis, Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons, 2014.
  3. R. Von Solms and J. Van Niekerk, "From information security to cyber security," Comput. Secur., vol. 38, pp. 97-102, 2013. https://doi.org/10.1016/j.cose.2013.04.004
  4. J. V. Gaud and M. M. Bartere, "Data Security Based on LAN Using Distributed Firewall," Int. J. Comput. Sci. Mob. Comput., 2014.
  5. L. Hansen and H. Nissenbaum, "Digital disaster, cyber security, and the Copenhagen School," Int. Stud. Q., vol. 53, no. 4, pp. 1155-1175, 2009. https://doi.org/10.1111/j.1468-2478.2009.00572.x
  6. N. A. Sales, "Regulating cyber-security," Nw UL Rev, vol. 107, p. 1503, 2012.
  7. M. Junaid, M. Mufti, and M. U. Ilyas, "Vulnerabilities of IEEE 802.11 i wireless LAN CCMP protocol," Trans. Eng. Comput. Technol., vol. 11, pp. 228-233, 2006.
  8. J. W. Branch, N. L. Petroni, L. Van Doorn, and D. Safford, "Autonomic 802.11 wireless LAN security auditing," IEEE Secur. Priv., vol. 2, no. 3, pp. 56-65, 2004. https://doi.org/10.1109/MSP.2004.4
  9. S. Miehlke et al., "Efficacy and safety of budesonide, vs mesalazine or placebo, as induction therapy for lymphocytic colitis," Gastroenterology, vol. 155, no. 6, pp. 1795-1804, 2018. https://doi.org/10.1053/j.gastro.2018.08.042
  10. J.-C. Chen, M.-C. Jiang, and Y. Liu, "Wireless LAN security and IEEE 802.11 i," IEEE Wirel. Commun., vol. 12, no. 1, pp. 27-36, 2005. https://doi.org/10.1109/MWC.2005.1404570
  11. D. E. Denning and P. J. Denning, "Data security," ACM Comput. Surv. CSUR, vol. 11, no. 3, pp. 227-249, 1979. https://doi.org/10.1145/356778.356782
  12. J. V. Gaud and M. B. Mahip, "Data security based on LAN using distributed firewalls," Int. J. Comput. Sci. Mob. Comput., 2014.
  13. U. Lamping and E. Warnicke, "Wireshark user's guide," Interface, vol. 4, no. 6, p. 1, 2004.
  14. P. Zhang and K. Xia, "Custom Protocol Analysis Based on Wireshark".
  15. B. P. Miller, "Vulnerability assessment of open source wireshark and chrome browser," WISCONSIN UNIV MADISON, 2013.
  16. "3.3.1. Network Security challenges - Barbaadachiisaa Google." https://www.google.com/search? (accessed Sep. 08, 2021).
  17. "Network Security Challenges & Threats | Vital IT Security Issues." https://www.firemon.com/networksecurity-threats-challenges/ (accessed Sep. 08, 2021).
  18. "End to End Communication - an overview | ScienceDirect Topics." https://www.sciencedirect.com/topics/computerscience/end-to-end-communication (accessed Sep. 08, 2021).
  19. "Network Security a Overview." https://www.tutorialspoint.com/network_security/network_security_overview.htm (accessed Sep. 08, 2021).
  20. C. H. Sandeep, V. Thirupathi, P. Pramod kumar, and S. Naresh kumar, "Goals and Model of Network Security," Int. J. Adv. Sci. Technol., vol. 28, no. 20, pp. 593-599, 2019.
  21. I. A. Sumra, H. B. Hasbullah, and J. B. AbManan, "Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey," in Vehicular Ad-Hoc Networks for Smart Cities, Springer, 2015, pp. 51-61.