Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach

T It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based...

Full description

Saved in:
Bibliographic Details
Main Authors: Al Naeem, Mohammed Abdul Aziz, Abubakar, Adamu, Hafizur Rahman, M. M.
Format: Article
Language:English
English
English
Published: IEEE 2020
Subjects:
Online Access:http://irep.iium.edu.my/84606/1/Published.pdf
http://irep.iium.edu.my/84606/7/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_Scopus.pdf
http://irep.iium.edu.my/84606/8/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_WOS.pdf
http://irep.iium.edu.my/84606/
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9241700
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.84606
record_format dspace
spelling my.iium.irep.846062021-03-30T07:22:23Z http://irep.iium.edu.my/84606/ Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach Al Naeem, Mohammed Abdul Aziz Abubakar, Adamu Hafizur Rahman, M. M. QA76 Computer software T It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based Networking approach in this study. Two algorithms are proposed, utilizing single-path and multipath in transmission flow. Every path is potentially weak and a point of failure for which a network security can be breached. Two sets of rules, namely, ‘‘vulnerability rules policies’’ with ‘‘rules formulation’’ from the regions of connection recognized by Euler’s theorem were outlined. The intent is to use these sets of rules in finding the point of failure the packet status that is leading to possible security breaches within network connections. The frequencies of the packets that are liable to create security breaches and the paths where they originate are analyzed. Well-formed packet originating from the least likely weak point of failure is associated the network security breach than malformed packets. This study has contributed to revealing that network security breaches are influenced by the paths with least likely point of failure from well-formed packets. IEEE 2020-10-28 Article PeerReviewed application/pdf en http://irep.iium.edu.my/84606/1/Published.pdf application/pdf en http://irep.iium.edu.my/84606/7/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_Scopus.pdf application/pdf en http://irep.iium.edu.my/84606/8/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_WOS.pdf Al Naeem, Mohammed Abdul Aziz and Abubakar, Adamu and Hafizur Rahman, M. M. (2020) Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach. IEEE Access, 8. pp. 197554-197566. E-ISSN 2169-3536 https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9241700 10.1109/ACCESS.2020.3034383
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
English
topic QA76 Computer software
spellingShingle QA76 Computer software
Al Naeem, Mohammed Abdul Aziz
Abubakar, Adamu
Hafizur Rahman, M. M.
Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
description T It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based Networking approach in this study. Two algorithms are proposed, utilizing single-path and multipath in transmission flow. Every path is potentially weak and a point of failure for which a network security can be breached. Two sets of rules, namely, ‘‘vulnerability rules policies’’ with ‘‘rules formulation’’ from the regions of connection recognized by Euler’s theorem were outlined. The intent is to use these sets of rules in finding the point of failure the packet status that is leading to possible security breaches within network connections. The frequencies of the packets that are liable to create security breaches and the paths where they originate are analyzed. Well-formed packet originating from the least likely weak point of failure is associated the network security breach than malformed packets. This study has contributed to revealing that network security breaches are influenced by the paths with least likely point of failure from well-formed packets.
format Article
author Al Naeem, Mohammed Abdul Aziz
Abubakar, Adamu
Hafizur Rahman, M. M.
author_facet Al Naeem, Mohammed Abdul Aziz
Abubakar, Adamu
Hafizur Rahman, M. M.
author_sort Al Naeem, Mohammed Abdul Aziz
title Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
title_short Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
title_full Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
title_fullStr Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
title_full_unstemmed Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
title_sort dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
publisher IEEE
publishDate 2020
url http://irep.iium.edu.my/84606/1/Published.pdf
http://irep.iium.edu.my/84606/7/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_Scopus.pdf
http://irep.iium.edu.my/84606/8/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_WOS.pdf
http://irep.iium.edu.my/84606/
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9241700
_version_ 1696976069215649792
score 13.214268