A review on the protocol systems for security enhancement of administrative devices



EOI: 10.11242/viva-tech.01.05.035

Download Full Text here



Citation

Ms. Yash Pandhare, Ms. Aditya Bawa, Ms. Pawan Pujari, Prof. Ashwini Save, "A review on the protocol systems for security enhancement of administrative devices", VIVA-IJRI Volume 1, Issue 5, Article 35, pp. 1-6, 2022. Published by Computer Engineering Department, VIVA Institute of Technology, Virar, India.

Abstract

With the increased number of people on the internet, the extent of crimes committed has seen a drastic increase as a direct effect. Most enterprises enhance their security at the primary level by using some form of multi-factor authentication usually limited to Phone or Access card based MFA (Multi-Factor Authentication), although adequate in the past, as with the increasing attack vectors, and types of attacks. Nevertheless a system cannot be completely secure to all possible threats now or in the near future, these risks need to be minimized to the lowest extent possible. One method of minimizing this risk is Proper access control. Moreover, a thorough research on the existing systems shows that the systems used in enterprise solutions are still vulnerable to attacks due to the lack of factors. This paper shows the brief of the existing technology used to overcome the threats posed by the existence of administrative devices that have privileged access across a system.

Keywords

Cyber security, host security, multi-factor authentication, access control, enterprise security

References

  1. Sanjar Ibrokhimov, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Hoon Jae Lee and Mangal Sain Multi-Factor Authentication in Cyber Physical System: A State of Art Survey, 21st International Conference on Advanced Communication Technology (ICACT) 17-20 Feb. 2019, PyeongChang, Korea (South), DOI 10.23919/ICACT.2019.8701960
  2. Shengju Yang, Jie Meng Research on Multi-factor Bidirectional Dynamic Identification Based on SMS, IEEE’s 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 12-14 Oct. 2018, Chongqing, China, DOI 10.1109/IAEAC.2018.8577505
  3. Linjiang Xie, Hequn Xian, Xuyue Tang, Wei Guo, Feilu Hang, Ning Fang G-Key: An Authentication Technique for Mobile Devices Based on Gravity Sensors, IEEE’s International Conference on Power Data Science (ICPDS) 22-24 Nov. 2019, Taizhou, China, DOI 10.1109/ICPDS47662.2019.9017188
  4. Shahriar Rahman Fahim, Saquib Shahriar, Omar Kamrul Islam, Md. Ilias Rahman, Subrata K. Sarker, Shahela Akter, Development of a Remote Tracking Security Box with Multi-Factor Authentication System Incorporates with a Biometric Sensing Device, 5th IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE) 15-16 Nov. 2019, Bangalore, India, DOI 10.1109/WIECON-ECE48653.2019.9019973
  5. Wiphop Pomak, Yachai Limpiyakom, Enterprise WiFi Hotspot Authentication with Hybrid Encryption on NFC- Enabled Smartphones, 8th International Conference on Electronics Information and Emergency Communication (ICEIEC) 15-17 June 2018, Beijing, China, DOI 10.1109/ICEIEC.2018.8473476
  6. Bandar Omar ALSaleem; Abdullah I. Alshoshan, Multi-Factor Authentication to Systems Login, 2021 National Computing Colleges Conference (NCCC), 27-28 March 2021, Taif, Saudi Arabia, DOI 10.1109/NCCC49330.2021.9428806
  7. Asim Balarabe Yazid; Moussa Mahamat Boukar; Salisu Yusuf Ibrahim; Isa Muslu, Four-Factors Authentication Algorithm For Preventing Fake Attendance, 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) 10-12 Dec. 2019, Abuja, Nigeria DOI: 10.1109/ICECCO48375.2019.9043287
  8. Xiao-Si Wang; Ian Herwono; Francesco Di Cerbo; Paul Kearney; Mark Shackleton, Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services, 2018 IEEE Conference on Communications and Network Security (CNS), 30 May-1 June 2018, Beijing, China, DOI 10.1109/CNS.2018.8433212
  9. Yue Guo; Jie Xu; Hui Yuan; Yan Zhuang; Guowei Zhu; Yintie Zhang, Research on Enterprise Computer Network Security Protection Technology Based on Information Technology, 2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE) 20-22 Nov. 2020, Shenyang, China, DOI 10.1109/AUTEEE50969.2020.9315704
  10. Dipti Watni; Sonal Chawla, A Comparative Evaluation of Jpeg Steganography, 2019 5th International Conference on Signal Processing, Computing and Control (ISPCC), 10-12 Oct. 2019, Solan, India, DOI 10.1109/ISPCC48220.2019.8988383
  11. Arnold Gabriel Benedict, Improved File Security System Using Multiple Image Steganography, 2019 International Conference on Data Science and Communication (IconDSC), 1-2 March 2019, Bangalore, India, DOI 10.1109/IconDSC.2019.8816946
  12. F. Jaafar, G. Nicolescu and C. Richard, ”A Systematic Approach for Privilege Escalation Prevention,” 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2016, pp. 101-108, doi: 10.1109/QRS-C.2016.17.
  13. A. Zaytsev, A. Malyuk and N. Miloslavskaya, "Critical Analysis in the Research Area of Insider Threats," 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), 2017, pp. 288-296, doi: 10.1109/FiCloud.2017.16.
  14. Dipti Watni; Sonal Chawla, A Comparative Evaluation of Jpeg Steganography, 2019 5th International Conference on Signal Processing, Computing and Control (ISPCC), 10-12 Oct. 2019, Solan, India, DOI 10.1109/ISPCC48220.2019.8988383
  15. Abhishek K., Roshan S., Kumar P., Ranjan R. (2013) A Comprehensive Study on Multi Factor Authentication Schemes. In: Meghanathan N., Nagamalai D., Chaki N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 177. Springer, Berlin, Heidelberg. DOI: 10.1007/978-3-642-31552-7_57
  16. Yifan Liu; Bo Zhao; Pengyuan Zhao; Peiru Fan; Hui Liu, A survey: Typical security issues of software-defined networking China Communications ( Volume: 16, Issue: 7, July 2019), Page(s): 13 - 31, 19 July 2019, DOI: 10.23919/JCC.2019.07.002