Research Paper on "Network Research Encountering -- and Countering"

Research Paper 10 pages (2984 words) Sources: 10

[EXCERPT] . . . .

Network Research

Encountering -- and Countering -- Unstructured Attacks: Current Issues in Network Security Monitoring

As technology and information networks continue to grow in complexity and in sheer size, and as they become more prevalent and important to industries and organizations of all sorts, the problems encountered in network security and network security monitoring are themselves growing in number and complexity. Hardware changes, software developments, and an ever-adapting range of purposeful and accidental security threats through unauthorized activity have led to the rapid evolution of network security monitoring in many ways, while at the same time certain basic elements and frameworks for understanding issues remain the same. This juxtaposition of the old and the new in the world of network security monitoring means that basic and current understandings of problems and solutions that might be encountered in the field are useful and indeed necessary, but also that knowledge must continually develop along with the monitoring complexities themselves. This can be an arduous task in and of itself, given the amount of practical experience and explicit research generating new knowledge on a constant basis.

To further complicate matters, the number of individuals capable of affecting network security in adverse ways is also growing, both in absolute and relative terms -- that is, a growing proportion of the population is computer-literate enough to purposefully attack, access, or otherwise wrongfully affect or utilize secure information networks -- meaning there is more human creativity being put towards efforts that threaten network security an
Continue scrolling to

download full paper
d that require careful attention from network security monitors. As learning how to manipulate Internet and network technologies becomes a more prominent and popular feature of common education and knowledge, not only the number but also the nature of attacks changes to a certain degree. More people capable of utilizing networks in an unauthorized or malicious fashion does not mean that more people are truly expert at this, or even that they have sophisticated or long-term ends for such network misuse, but simply that there are more people able and willing to engage in unauthorized and potentially malicious network use engaged in what they see as pranks or in purposefully visible forms of organizational disruption. These attacks are generally less harmful, at least in direct terms, when it comes to network security, however they can also be more difficult to handle.

Unstructured threats are those attacks on a network (or, in some perspectives, weaknesses in network security and monitoring that allow for these attacks) that do not have a true purpose or a fixed empirical methodology, and though this covers a range of potential attacks they can largely be addressed as a functional group (Bejtlich, 2004; Barth, 2008). Because these attacks are les fixed in purpose and methodology and tend to be more visible and with a lower need for subtlety and efficacy, they are also the type of attack or threat that is more and more likely to occur as greater numbers of lay people acquire some level of ability in terms of network utilization and disruption. Given the evolution of network knowledge and of network security threats, it is in the area of unstructured threats that network security monitors face perhaps the greatest challenges, as this is the area most likely to develop newer threats and methods of attack at a more rapid pace. Even though these attacks might ultimately be less harmful to the organization attacked due to the lack of criminal intent and the rather superficial nature of most such attacks, unstructured attacks can be highly disruptive to network operations and to organizational productivity and public image, and thus can be quite harmful. The following pages present an overview of the current literature regarding unstructured threats and the mean for addressing them, providing a definition and in-depth analysis of unstructured threats as they typically present today. Certain conflicts and gaps in the literature are identified, as are the current trends and consistent findings as well as the general frameworks that have been constructed and shown to be effective in dealing with unstructured threats, and overall recommendations in response to a general risk assessment are also given.

Literature Review

Current research related to the area of unstructured threats to/attacks on network security covers a range of specific topics and brings several different perspectives to bear on the issue. Practical as well as ethical implications are covered, and there are high levels both of observational data that define certain patterns and issues affecting network security monitoring and of modeling and experimental findings that suggest certain solutions or approaches to addressing identified problems. Despite the many different views and the diverse nature of the data related to this topic, however, there are still certain questions that remain poorly investigated and largely unanswered, and knowledge gaps in the overall investigation of unstructured threats. Though the research gathered and presented here is of course not a comprehensive list of all topics and perspectives that can and have been utilized in the examination of unstructured threats, but it does provide a fair representation of the level and scope of information that is currently available and thus is useful both in providing broad assessments of trends in the literature and in identifying potential problem areas.

One of the problems holding back research and preventing the acquisition of solid data in this area is the large amount of network data that is generated in unsecured threats/attacks and generally speaking, much of which must be analyzed in order to develop a clear understanding of how these attacks can occur and what might possibly be done to prevent them (Stiawan et al., 2011). This is a general problem when it comes to many aspects of network monitoring and network security, but is especially problematic when it comes to unstructured threats and unstructured data; the very nature of being unstructured means it is more difficult to determine strong patterns in data and thus to develop empirical means for testing responses to unsecured threats (Stiawan et al., 2011). The formation of unstructured threats and the lack of purpose that is inherent to unstructured attacks makes them far less predictable, and though more advanced data mining techniques have been advanced in an attempt to address these issues there is still a difficulty in the prediction, prevention, and the development of effective general responses to unstructured attacks and the threats that underlie these attacks (Ahmad & Habib, 2010; Stiawan et al., 2011).

When networks themselves are less fixed, less predictable, and less structured, the problems of unstructured threats are intensified all the more, and this is becoming an increasing problem as a variety of networks have emerged with the explicit purpose of allowing for large communities of individuals to engage in some level of network activity with what is ultimately a low degree of monitoring and security at the level of actual user interfacing (Fan, 2011; Xu et al., 2011; Cao & Liu, 2012). Peer-to-peer networks now exist for a wide variety of reasons, and they offer a plethora of options for personal and network interaction to their users, making them both incredibly useful and inspiring testaments to technology and highly attractive targets for unstructured attacks -- attacks brought about simply for fun, or for the individual(s) launching the attack to see what they can do without having any actual end in mind (Bjetlich, 2004; Fan, 2011; Xu et al., 2011; Cao & Liu, 2012). The number of users in these systems and the highly varied and variable patterns of network activity make monitoring the networks for potential unstructured attacks quite difficult, and also maintains the threat of unstructured attacks at a consistent, high level (Barth, 2008; Fan, 2011; Xu et al., 2011; Cao & Liu, 2012). This opens relatively unstructured networks to a variety of unstructured attacks by creating much greater threat levels than exist within more closed, controlled, and consciously structured networks (Fan, 2011; Xu et al., 2011; Cao & Liu, 2012).

One of the primary issues when it comes to unstructured attacks is that they depend to some degree -- in peer-to-peer networks, to a large degree -- on human psychology, and not on rational and strictly mathematical rules and patterns of behavior (Bejtlich, 2004; Cao & Liu, 2012). Mathematical models of the trust relationships that exist (or should exist, or must exist, etc.) in peer-to-peer networks have been attempted, however, and both the difficulty in developing reliable and accurate models and the results of simulations conducted with these models demonstrate the difficulty of planning for, preparing for, and addressing unstructured attacks (Cao & Liu, 2012). The level of trust in peer-to-peer networks and the specific relationships of trust that develop or fail to develop speak directly to the level and nature of unstructured threats that the network faces, and thus a mathematical model of such behavior that can be proactively addressed is necessary to fully deal with unstructured threats and attacks.

The nature of semi-structured or largely unstructured networks such as peer-to-peer networks also enables certain unstructured threats… READ MORE

Quoted Instructions for "Network Research Encountering -- and Countering" Assignment:

Research Paper:

Please write a research paper based on the attached idea Paper. Paper organization will include:

Introduction

Clearly define the problem or issue.

Starts out broad and becomes more and more specific.

Body

Present the relevant literature and ideas.

Identify relations, contradictions, gaps, and inconsistencies in the literature.

Possible solutions to any problem(s) identified.

Conclusion

References (at least ten).

You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source is not accepted). The paper must by at least 10 pages double-spaced, 1***** margin all around, black12 point fonts (Times New Roman, Arial, or Courier) with correct citations of all utilized references/sources, not counting any pictures, graphics, etc. A minimum of 10 references are needed. The paper may be submitted to Turnitin to check for proper citation attribution. *****

*****

How to Reference "Network Research Encountering -- and Countering" Research Paper in a Bibliography

Network Research Encountering -- and Countering.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/network-research-encountering/32862. Accessed 6 Jul 2024.

Network Research Encountering -- and Countering (2012). Retrieved from https://www.a1-termpaper.com/topics/essay/network-research-encountering/32862
A1-TermPaper.com. (2012). Network Research Encountering -- and Countering. [online] Available at: https://www.a1-termpaper.com/topics/essay/network-research-encountering/32862 [Accessed 6 Jul, 2024].
”Network Research Encountering -- and Countering” 2012. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/network-research-encountering/32862.
”Network Research Encountering -- and Countering” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/network-research-encountering/32862.
[1] ”Network Research Encountering -- and Countering”, A1-TermPaper.com, 2012. [Online]. Available: https://www.a1-termpaper.com/topics/essay/network-research-encountering/32862. [Accessed: 6-Jul-2024].
1. Network Research Encountering -- and Countering [Internet]. A1-TermPaper.com. 2012 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/network-research-encountering/32862
1. Network Research Encountering -- and Countering. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/network-research-encountering/32862. Published 2012. Accessed July 6, 2024.

Related Research Papers:

Modernity the Discourse Research Proposal

Paper Icon

Modernity

The discourse of modernity is unfortunate in that it tends to entail a certain hostility to non-Western cultures. This type of discourse and its inherent hostility operates to exclude… read more

Research Proposal 9 pages (3436 words) Sources: 0 Topic: Israel / Palestine / Arab World


Logistics Simulation Research Proposal

Paper Icon

Distribution Planning Systems Based on the Traveling Salesman Problem]

The work of Applegate, Bixby, Chvatal and Cook (2007) entitled: "The Traveling Salesman Problem" states the following: "Given a set of… read more

Research Proposal 8 pages (3243 words) Sources: 1+ Style: Harvard Topic: Transportation / Mass Transit


Art Violence and Social Engagement in Colombia Research Proposal

Paper Icon

Colombia is the third-largest recipient of military aid from the United States and is at a critical juncture in its turbulent history. More than three million people have been displaced… read more

Research Proposal 58 pages (19788 words) Sources: 35 Style: Chicago Topic: Latin America / Mexico / Caribbean


Ethical Issues in Group Counseling Research Paper

Paper Icon

Ethical Issues in Group Counseling

Any counseling scenario introduces a variety of ethical issues because counseling involves human beings who are frequently at their most vulnerable, seeking help and advice… read more

Research Paper 12 pages (4046 words) Sources: 12 Style: APA Topic: Psychology / Behavior / Psychiatry


How Homeland Security Combats the Financing of Terrorism Research Paper

Paper Icon

Financing Terrorism: America's Unique Position In Blocking Such Efforts

Aside from issues in foreign policy and tense international relations, arguments about oil, and other factors which contributed to 9/11, the… read more

Research Paper 11 pages (3643 words) Sources: 1 Topic: Terrorism / Extremism / Radicalization


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!