IIUM Repository

Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach

Al Naeem, Mohammed Abdul Aziz and Abubakar, Adamu and Hafizur Rahman, M. M. (2020) Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach. IEEE Access, 8. pp. 197554-197566. E-ISSN 2169-3536

[img]
Preview
PDF
Download (4MB) | Preview
[img] PDF (Scopus) - Published Version
Restricted to Registered users only

Download (773kB) | Request a copy
[img] PDF (WOS) - Published Version
Restricted to Registered users only

Download (400kB) | Request a copy

Abstract

T It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based Networking approach in this study. Two algorithms are proposed, utilizing single-path and multipath in transmission flow. Every path is potentially weak and a point of failure for which a network security can be breached. Two sets of rules, namely, ‘‘vulnerability rules policies’’ with ‘‘rules formulation’’ from the regions of connection recognized by Euler’s theorem were outlined. The intent is to use these sets of rules in finding the point of failure the packet status that is leading to possible security breaches within network connections. The frequencies of the packets that are liable to create security breaches and the paths where they originate are analyzed. Well-formed packet originating from the least likely weak point of failure is associated the network security breach than malformed packets. This study has contributed to revealing that network security breaches are influenced by the paths with least likely point of failure from well-formed packets.

Item Type: Article (Journal)
Additional Information: 7132/84606
Uncontrolled Keywords: Well-formed packet, malformed packet, point of failure, security breaches.
Subjects: Q Science > QA Mathematics > QA76 Computer software
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology

Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Dr Adamu Abubakar
Date Deposited: 13 Nov 2020 11:16
Last Modified: 30 Mar 2021 15:22
URI: http://irep.iium.edu.my/id/eprint/84606

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year