Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Pramod K, Aswathy Venu
DOI Link: https://doi.org/10.22214/ijraset.2023.49894
Certificate: View Certificate
As the nature of the threat in networks evolves daily, it is vitally important that defense techniques evolve as well. Earlier threats from both internal and external sources were gradual and can be easily tracked and destroyed. But now Internet worms are spread all over the world, so it is essential for protection systems and the network itself to respond immediately to threats. The basis of community self-defense is the importance of countering threats in the community. Every device found in a community plays a vital role in keeping the community safe. This guarantees the security of statistics and protects the community from internal and external threats. It identifies and responds to threats, isolates infected servers and structures, and then reconfigures the network in response to the attack. Self-Defending Networks are proactive and automated computer networks that are designed to detect, prevent, and respond to security threats. They use advanced technologies like machine learning, artificial intelligence, and behavioral analysis to monitor network traffic, identify potential security breaches, and take action to prevent them. By deploying SDNs, organizations can achieve a higher level of security for their networks and protect their assets from a wide range of cyber threats.
I. INTRODUCTION
With the number of computer networks growing day by day, it is also important to make them more secure and reliable. Security concerns increase as more and more data traverses networks, requiring more complex and reliable protection for networks. Therefore, it is very important to ensure the security of both software and hardware components in the network. For a more secure network, a proper analysis of all types of threats that may occur in the network must be performed, followed by proper network design. This white paper discusses the need for artificial intelligence in network security to make networks intelligent. This white paper also introduces the next-generation smart network, a Self-Defending Network (SDN), a network that analyzes all known and unknown threats that may come across the network. This self-defense network provides protection against internal as well as external threats. Minimize data threats with the network capable of handling large amounts of data and information very quickly.
II. LITERATURE SURVEY
Anshuman Kumar , Abhilash Kamtam and U C Patkar make a research on “Self Defending Approach Of A Network” and describe that Because the nature of network threats changes every day, it is important that protection methods evolve as well. Previously, threats from both internal and external sources were slow and easy to track and eliminate. But now that Internet worms are spreading globally, it's important that security systems and the networks themselves respond promptly to threats. The foundation of network self-defense is critical to responding to threats on the network. Each device on the network plays an important role in network security.This ensures data security and protects the network from internal and external threats. Detect and respond to threats, isolate infected servers and systems, and reconfigure networks in response to attacks.
Duane De Capite make a research on “Self Defending Networks: The Next Generation Of Network Security” this research provides a overall view on protect your community with self-regulating network protection solutions that combat each internal and external threats. provides an overview of the safety components used to design proactive network security helps community safety professionals recognize what the present day gear and techniques can do and how they interact affords distinct records on how to use integrated control to growth safety consists of a layout guide with step-by using-step implementation instructions Self-defending Networks: the next era of network security enables networking professionals apprehend how to deploy an end-to-end, integrated community security answer. It presents a clear view of the various components that may be used at some stage in the network to now not most effective reveal visitors however to allow the network itself to grow to be more proactive in preventing and mitigating network assaults. This security primer presents particular perception into the whole range of Cisco protection answers, showing what each detail is capable of doing and how all the portions work together to shape an quit-to-quit Self-protecting network. at the same time as other books generally tend to awareness on character safety components, presenting in-intensity configuration hints for various gadgets and technology, Self-protecting Networks rather offers a high-degree review of the entire range of technologies and techniques that incorporate the latest questioning in proactive community protection defenses.
S. Neelavathy Pari , D.Sridharan conduct a research on “Design Of Cross Layered Security Architecture To Mitigate Misbehaving Nodes In Self Defending Networks ” and states that Countermeasures for node misbehavior and selfishness are mandatory necessities in cell advert hoc network (MANET). Selfishness nodes reason missing in transmission which can not be solved with the aid of classical safety mechanisms as this method pay attention handiest in the correctness and integrity of an operation. on this paper, we advise a new routing protocol relied on course Routing Protocol (TPRP) to enforce cooperation a few of the nodes of the MANET and to save you selfish behavior. each mobile node within the network keeps a records structure referred to as trust and reputation table (TRT) to preserve song of other node's conduct. finding out a node to be malicious involves choice making and therefore it's far a problem of uncertainty. The best way to address uncertainty is by using the means of chance. So we make use of Bayesian possibility mathematical version to calculate accept as true with cost that lies between zero and 1. If the agree with price goes underneath the brink believe, then the node is called as malicious and excluded from the community. © EuroJournals Publishing, Inc. 2012.
Brian McKenna conduct a survey on “Network Futures: Dumb And Fast ,Or Smart And Self-Defending?” and describe that the human immune system is being invoked increasingly more as a metaphor for the way ICT networks must work. Cisco CEO John Chambers regaled RSA 2006 delegates ultimate month with a tale of ways his company's self-protecting community idea is inspired through human biology. Others are extra sceptical. Evan Kaplan, CEO of SSL VPN dealer Aventail spoke approximately this development to Brian McKenna, for Infosecurity nowadays, at RSA in San José. © 2006 Elsevier Ltd. All rights reserved.
Nicholas Bambos make a research on “Short Paper: Dynamic Risk Mitigation For ‘Self Defending’ Network Security” and make a conclusion, they introduce1 a novel probabilistic modeling2 framework, which captures key overall performance tradeoffs bobbing up in records network protection. Given a hard and fast of assets to be had to guard and guard a network, how have to those be dynamically configured to maximize the safety stage? exceptional aid configurations enable numerous community defense modes. except the capital and operational fees of the assets, there are also 'invasiveness' costs associated with stresses that community users experience due to protection measures. How should these charges be balanced and the way ought to the network dynamically configure its safety resources to correctly shield itself? Taking a threat management factor of view, we expand a parsimonious bendy model, taking pictures the above troubles in a unified manner. The model enables the formula of key optimization schemes for dynamically controlling the network protection modes thru 8db290b6e1544acaffefb5f58daa9d83 algorithms. It presents a systematic design framework for 'self-defending' networks that may autonomously maintain their integrity within the presence of changing destructive situations. © 2005 IEEE
III. METHODOLOGY
The methodology used in this study are :
A. End-Point Protection
Protective the quit-point in any network may be very essential.Any non-sanitized quit person linked to a network can come to be harmful hazard to the network. This non-sanitized stop person then turns into the weakest link within the network and can without difficulty by targeted by means of an attacker. For this Cisco has delivered Cisco security Agent software that's taken into consideration as Intrusion prevention tool. operating for the quit-points like quit customers and servers, it is designed to correlate appropriate and suspicious behaviour and save you new attacks, even before a security patch or “signature” can replace the network’s antivirus or different safety software. Configuring the running gadget and the network firewall in a new way protects the stop user records and information. the safety agent detects all styles of malware or worms on stop-user structures and protects them with by using supplying safety patches and antivirus updates. the security Agent additionally guarantees relaxed and efficient transmission of information over the network, minimizing threats to cease-consumer systems.
B. Admission Control
Any user whilst first of all joins the network is furnished various safety regulations and degree of get right of entry to is granted to every person in the network. these types of work is executed by way of the network Admission control. network Admission control assists in determining the extent of get entry to that is need to be granted to every user. It also divides the stop user among network administrator and end person hence presenting the get entry to degrees to each user in keeping with its kind and priorities. NAC additionally controls the access by way of interrogating devices when linked to determine whether or not they comply security policies or no longer. NAC makes use of this information to determine appropriate network admission policy enforcement for each endpoint based on the security country of the OS and associated packages instead of sincerely on who's soliciting for get right of entry to. except detecting, analysing, and performing on community behaviour, Cisco safety Agent can song which programs are established on a unmarried pc or workgroup; which programs use the network; the identity of all remote IP addresses with whom a server or computer pc communicates; and the nation of all applications on far flung systems, which include user-specific installation information and whether or not undesired programs are attempting to run.
???????C. Infection Containment
It’s the potential of SDN to discover unauthorized structures or network attacks as they arise and hence reacting accurately and minimizing the impact of the breech on the network. It particularly follows these 3 steps:
a. Makes use of the automated tool.
b. Disables the connectivity.
c. Disables the services
d. Gets rid of the vulnerability.
3. Keep Records Of Every Action Taken: It becomes very critical to maintain file of all of the movements that are taken by means of the community throughout outbreak in order that the network can resume its services from wherein it had left. some containment additionally requires transient amendment or configuration which needs to be eliminated after the incident. For all these it will become very critical to preserve a solid report of each and each moves which are taken.
D. Incident Response
It’s the services that the Self-defending network offers on every occasion any incident take area within the community. each time it unearths any incidents inside the network, it speedy responds to it provides the appropriate offerings and takes all of the vital steps that desires to be taken right away. all of the movements are taken through suitable nodes and those moves are taken in real time. all the nodes paintings in integration to provide safety approach to incident and making the network more potent. It takes the expertise of the community infrastructure and offerings, protecting it with emergency plans, and installing equipment and scripts that takes on the spot moves whenever any incident takes location.
IV. LOGO OF SELF-DEFENDING NETWORKS
???????VI. ???????FEATURES
VII. EXAMPLES
Here are a few examples of how Spam Assassin is used in real-world scenarios:
VIII. HOW SELF DEFENDIND NETWORKS WORKS?
A. Which Algorithm Used ?
Self-defending networks use a variety of algorithms to detect and respond to cyber threats. Here are some of the algorithms that are commonly used in self-defending networks:
B. Rules And Algorithms Used
IX. APPLICATIONS
X. ADVANTAGES
Self-defending networks offer several advantages over traditional network security solutions. Here are some of the key advantages of self-defending networks:
In summary, self-defending networks offer a number of key advantages over traditional network security solutions, including real-time threat detection and response, automation and efficiency, comprehensive network security, scalability, and reduced risk and increased resilience.
XI. DISADVANTAGES
While self-defending networks offer several advantages, they also come with some potential disadvantages that organizations should be aware of before implementing them. Here are some of the disadvantages of self-defending networks:
In summary, while self-defending networks offer many benefits, organizations should carefully consider the potential disadvantages before implementing them. It is important to ensure that the organization has the necessary technical expertise, resources, and budget to effectively implement and manage a self-defending network. Additionally, organizations should have a plan in place to address potential false positives or false negatives, as well as any technical or operational issues that may arise.
XII. SCOPE OF FUTURE RESEARCH
The future scope of self-defending networks is promising, as advancements in technology and increased adoption of automation and AI are driving the development of more sophisticated and effective self-defending networks.
One potential area of future development for self-defending networks is the use of advanced machine learning algorithms to improve threat detection and response. This could include the use of deep learning models to analyze network traffic and behavior, as well as the integration of natural language processing (NLP) to help identify and respond to threats in real-time.
Another potential area of development is the integration of self-defending networks with other emerging technologies such as blockchain and the Internet of Things (IoT). By leveraging the decentralized and distributed nature of blockchain, self-defending networks could potentially provide more secure and reliable protection against cyber threats. Similarly, by integrating with IoT devices and sensors, self-defending networks could provide more granular visibility into network activity, enabling more effective threat detection and response.
As more organizations adopt cloud-based infrastructure and services, the future of self-defending networks may also involve the development of cloud-native security solutions. This could include the use of cloud-based machine learning algorithms to analyze network traffic and behavior, as well as the integration of security tools directly into cloud platforms to provide a more seamless and integrated security experience.
Overall, the future of self-defending networks is likely to be characterized by continued advancements in automation and AI, as well as increased integration with other emerging technologies. As cyber threats continue to evolve and become more sophisticated, self-defending networks will play an increasingly important role in protecting organizations against these threats.
Self-defending networks is a critical component of a robust cybersecurity strategy. By automating the detection and response to security threats, a self-defending network can significantly reduce the time it takes to mitigate an attack, thereby reducing the risk of data breaches and other security incidents. One of the key advantages of a self-defending network is its ability to identify and respond to both known and unknown threats. Traditional security technologies such as firewalls and IDPS are typically only effective against known threats, but a self-defending network uses AI and machine learning algorithms to identify patterns and anomalies that may indicate a new or unknown threat. This allows the network to quickly adapt to new threats and respond accordingly, reducing the risk of a successful attack. Another advantage of a self-defending network is its ability to automate security processes. Automation allows the network to operate at a much faster pace than would be possible with human intervention, enabling it to detect and respond to threats in real-time. This can significantly reduce the time it takes to detect and respond to a security incident, minimizing the potential impact on the organization. However, it is important to note that a self-defending network is not a substitute for a comprehensive security program. It should be implemented in conjunction with other security measures, such as access controls, firewalls, and intrusion detection systems, to provide a layered defense approach. Additionally, a self-defending network must be properly configured, maintained, and updated to ensure that it remains effective against evolving threats. In conclusion, a self-defending network is a powerful tool for protecting against cybersecurity threats. It provides real-time protection and enables organizations to quickly respond to attacks, reducing the risk of data breaches and other security incidents. However, it must be implemented with care and attention to both technical and organizational considerations, and should be used in conjunction with other security measures to provide a comprehensive defense approach.
[1] Kalaivani Chellappan, Ahmed Shamil Mustafa, Mohammed Jabbar Mohammed, Aqeel Mezher Thajeel, “Layered Defense Approach: Towards Total Network Security”, from International Journal of Computer Science and Business Information(IJCSBI), Vol. 15, No. 1. JANUARY 2015. [2] Yaoxiaoyang, “Study on Development of Information Security and Artificial Intelligence”, from 2011 Fourth International Conference on Intelligent Computation Technology and Automation. [3] Cisco Self-Defending Networks http://www.cisco.com/go/selfdefend [4] Enn Tyugu, “Artificial Intelligence in Cyber Defense”, 2011 3rd International Conference on Cyber Conflict C. Czosseck, E. Tyugu, T. Wingfield (Eds.) Tallinn, Estonia, 2011 © CCD COE Publications. [5] AK. Ghosh, C. Michael, M. Schatz. A Real-Time Intrusion Detection System Based on learning Program Behavior. Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, 2000, pp.93-109. [6] B. Iftikhar, A. S. Alghamdi, “Application of artificial neural network in detection of dos attacks,” in SIN ’09: Proceedings of the 2nd international conference on Security of information and networks. New York, NY, USA: ACM, 2009, pp. 229–234. [7] D. Stopel, Z. Boger, R. Moskovitch, Y. Shahar, and Y. Elovici, “Application of artificial neural networks techniques to computer worm detection,” in International Joint Conference on Neural Networks (IJCNN), 2006, pp. 2362–2369. [8] C.-H. Wu, “Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks,” Expert Systems with Applications, vol. 36, no. 3, Part 1, 2009, pp. 4321–4330. [9] Self-Defending Networks | IPTP Networks https://www.iptp.net/en_US/business-solutions/security/self- [10] The Importance of a Self-Defending Network | Allied Telesis https://www.alliedtelesis.com/in/en/blog/importance-self-
Copyright © 2023 Pramod K, Aswathy Venu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET49894
Publish Date : 2023-03-29
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here