Research Paper on "Network Research Encountering -- and Countering"
Research Paper 10 pages (2984 words) Sources: 10
[EXCERPT] . . . .
Network ResearchEncountering -- and Countering -- Unstructured Attacks: Current Issues in Network Security Monitoring
As technology and information networks continue to grow in complexity and in sheer size, and as they become more prevalent and important to industries and organizations of all sorts, the problems encountered in network security and network security monitoring are themselves growing in number and complexity. Hardware changes, software developments, and an ever-adapting range of purposeful and accidental security threats through unauthorized activity have led to the rapid evolution of network security monitoring in many ways, while at the same time certain basic elements and frameworks for understanding issues remain the same. This juxtaposition of the old and the new in the world of network security monitoring means that basic and current understandings of problems and solutions that might be encountered in the field are useful and indeed necessary, but also that knowledge must continually develop along with the monitoring complexities themselves. This can be an arduous task in and of itself, given the amount of practical experience and explicit research generating new knowledge on a constant basis.
To further complicate matters, the number of individuals capable of affecting network security in adverse ways is also growing, both in absolute and relative terms -- that is, a growing proportion of the population is computer-literate enough to purposefully attack, access, or otherwise wrongfully affect or utilize secure information networks -- meaning there is more human creativity being put towards efforts that threaten network security an
download full paper ⤓
Unstructured threats are those attacks on a network (or, in some perspectives, weaknesses in network security and monitoring that allow for these attacks) that do not have a true purpose or a fixed empirical methodology, and though this covers a range of potential attacks they can largely be addressed as a functional group (Bejtlich, 2004; Barth, 2008). Because these attacks are les fixed in purpose and methodology and tend to be more visible and with a lower need for subtlety and efficacy, they are also the type of attack or threat that is more and more likely to occur as greater numbers of lay people acquire some level of ability in terms of network utilization and disruption. Given the evolution of network knowledge and of network security threats, it is in the area of unstructured threats that network security monitors face perhaps the greatest challenges, as this is the area most likely to develop newer threats and methods of attack at a more rapid pace. Even though these attacks might ultimately be less harmful to the organization attacked due to the lack of criminal intent and the rather superficial nature of most such attacks, unstructured attacks can be highly disruptive to network operations and to organizational productivity and public image, and thus can be quite harmful. The following pages present an overview of the current literature regarding unstructured threats and the mean for addressing them, providing a definition and in-depth analysis of unstructured threats as they typically present today. Certain conflicts and gaps in the literature are identified, as are the current trends and consistent findings as well as the general frameworks that have been constructed and shown to be effective in dealing with unstructured threats, and overall recommendations in response to a general risk assessment are also given.
Literature Review
Current research related to the area of unstructured threats to/attacks on network security covers a range of specific topics and brings several different perspectives to bear on the issue. Practical as well as ethical implications are covered, and there are high levels both of observational data that define certain patterns and issues affecting network security monitoring and of modeling and experimental findings that suggest certain solutions or approaches to addressing identified problems. Despite the many different views and the diverse nature of the data related to this topic, however, there are still certain questions that remain poorly investigated and largely unanswered, and knowledge gaps in the overall investigation of unstructured threats. Though the research gathered and presented here is of course not a comprehensive list of all topics and perspectives that can and have been utilized in the examination of unstructured threats, but it does provide a fair representation of the level and scope of information that is currently available and thus is useful both in providing broad assessments of trends in the literature and in identifying potential problem areas.
One of the problems holding back research and preventing the acquisition of solid data in this area is the large amount of network data that is generated in unsecured threats/attacks and generally speaking, much of which must be analyzed in order to develop a clear understanding of how these attacks can occur and what might possibly be done to prevent them (Stiawan et al., 2011). This is a general problem when it comes to many aspects of network monitoring and network security, but is especially problematic when it comes to unstructured threats and unstructured data; the very nature of being unstructured means it is more difficult to determine strong patterns in data and thus to develop empirical means for testing responses to unsecured threats (Stiawan et al., 2011). The formation of unstructured threats and the lack of purpose that is inherent to unstructured attacks makes them far less predictable, and though more advanced data mining techniques have been advanced in an attempt to address these issues there is still a difficulty in the prediction, prevention, and the development of effective general responses to unstructured attacks and the threats that underlie these attacks (Ahmad & Habib, 2010; Stiawan et al., 2011).
When networks themselves are less fixed, less predictable, and less structured, the problems of unstructured threats are intensified all the more, and this is becoming an increasing problem as a variety of networks have emerged with the explicit purpose of allowing for large communities of individuals to engage in some level of network activity with what is ultimately a low degree of monitoring and security at the level of actual user interfacing (Fan, 2011; Xu et al., 2011; Cao & Liu, 2012). Peer-to-peer networks now exist for a wide variety of reasons, and they offer a plethora of options for personal and network interaction to their users, making them both incredibly useful and inspiring testaments to technology and highly attractive targets for unstructured attacks -- attacks brought about simply for fun, or for the individual(s) launching the attack to see what they can do without having any actual end in mind (Bjetlich, 2004; Fan, 2011; Xu et al., 2011; Cao & Liu, 2012). The number of users in these systems and the highly varied and variable patterns of network activity make monitoring the networks for potential unstructured attacks quite difficult, and also maintains the threat of unstructured attacks at a consistent, high level (Barth, 2008; Fan, 2011; Xu et al., 2011; Cao & Liu, 2012). This opens relatively unstructured networks to a variety of unstructured attacks by creating much greater threat levels than exist within more closed, controlled, and consciously structured networks (Fan, 2011; Xu et al., 2011; Cao & Liu, 2012).
One of the primary issues when it comes to unstructured attacks is that they depend to some degree -- in peer-to-peer networks, to a large degree -- on human psychology, and not on rational and strictly mathematical rules and patterns of behavior (Bejtlich, 2004; Cao & Liu, 2012). Mathematical models of the trust relationships that exist (or should exist, or must exist, etc.) in peer-to-peer networks have been attempted, however, and both the difficulty in developing reliable and accurate models and the results of simulations conducted with these models demonstrate the difficulty of planning for, preparing for, and addressing unstructured attacks (Cao & Liu, 2012). The level of trust in peer-to-peer networks and the specific relationships of trust that develop or fail to develop speak directly to the level and nature of unstructured threats that the network faces, and thus a mathematical model of such behavior that can be proactively addressed is necessary to fully deal with unstructured threats and attacks.
The nature of semi-structured or largely unstructured networks such as peer-to-peer networks also enables certain unstructured threats… READ MORE
Quoted Instructions for "Network Research Encountering -- and Countering" Assignment:
Research Paper:
Please write a research paper based on the attached idea Paper. Paper organization will include:
Introduction
Clearly define the problem or issue.
Starts out broad and becomes more and more specific.
Body
Present the relevant literature and ideas.
Identify relations, contradictions, gaps, and inconsistencies in the literature.
Possible solutions to any problem(s) identified.
Conclusion
References (at least ten).
You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source is not accepted). The paper must by at least 10 pages double-spaced, 1***** margin all around, black12 point fonts (Times New Roman, Arial, or Courier) with correct citations of all utilized references/sources, not counting any pictures, graphics, etc. A minimum of 10 references are needed. The paper may be submitted to Turnitin to check for proper citation attribution. *****
*****
How to Reference "Network Research Encountering -- and Countering" Research Paper in a Bibliography
“Network Research Encountering -- and Countering.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/network-research-encountering/32862. Accessed 6 Jul 2024.
Related Research Papers:
Modernity the Discourse Research Proposal
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Modernity
The discourse of modernity is unfortunate in that it tends to entail a certain hostility to non-Western cultures. This type of discourse and its inherent hostility operates to exclude… read more
Research Proposal 9 pages (3436 words) Sources: 0 Topic: Israel / Palestine / Arab World
Logistics Simulation Research Proposal
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Distribution Planning Systems Based on the Traveling Salesman Problem]
The work of Applegate, Bixby, Chvatal and Cook (2007) entitled: "The Traveling Salesman Problem" states the following: "Given a set of… read more
Research Proposal 8 pages (3243 words) Sources: 1+ Style: Harvard Topic: Transportation / Mass Transit
Art Violence and Social Engagement in Colombia Research Proposal
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Colombia is the third-largest recipient of military aid from the United States and is at a critical juncture in its turbulent history. More than three million people have been displaced… read more
Research Proposal 58 pages (19788 words) Sources: 35 Style: Chicago Topic: Latin America / Mexico / Caribbean
Ethical Issues in Group Counseling Research Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Ethical Issues in Group Counseling
Any counseling scenario introduces a variety of ethical issues because counseling involves human beings who are frequently at their most vulnerable, seeking help and advice… read more
Research Paper 12 pages (4046 words) Sources: 12 Style: APA Topic: Psychology / Behavior / Psychiatry
How Homeland Security Combats the Financing of Terrorism Research Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Financing Terrorism: America's Unique Position In Blocking Such Efforts
Aside from issues in foreign policy and tense international relations, arguments about oil, and other factors which contributed to 9/11, the… read more
Research Paper 11 pages (3643 words) Sources: 1 Topic: Terrorism / Extremism / Radicalization
Sat, Jul 6, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!