Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection

Pablo Daniel Marcillo Lara,Daniel Alejandro Maldonado-Ruiz,Santiago Daniel Arrais Díaz,Lorena Isabel Barona López,Ángel Leonardo Valdivieso Caraguay
2019-03-19
Abstract:The new generation of security threats has been promoted by digital currencies and real-time applications, where all users develop new ways to communicate on the Internet. Security has evolved in the need of privacy and anonymity for all users and his portable devices. New technologies in every field prove that users need security features integrated into their communication applications, parallel systems for mobile devices, internet, and identity management. This review presents the key concepts of the main areas in computer security and how it has evolved in the last years. This work focuses on cryptography, user authentication, denial of service attacks, intrusion detection and firewalls.
Cryptography and Security
What problem does this paper attempt to address?
### What Problem Does the Paper Attempt to Solve? The paper primarily explores the latest trends and technologies in the field of computer security, particularly focusing on new advancements in encryption technology, user authentication, denial-of-service attacks (DoS), and intrusion detection. Specifically: 1. **Encryption Technology**: - Investigates new improvements in symmetric encryption and public-key encryption technologies. - Explores the development of new technologies such as quantum encryption and elliptic curve encryption. - Analyzes the role of hash functions in ensuring information integrity and non-repudiation. 2. **User Authentication**: - Introduces the application of cryptography in user login and internet communication. - Discusses the latest advancements in various authentication methods, including password-based, physical token-based, biometric, and dynamic biometric authentication. - Pays special attention to two-factor authentication and dynamic biometric authentication schemes on mobile devices. 3. **Denial-of-Service Attacks (DoS)**: - Describes the principles of traditional DoS attacks and their distributed variants (DDoS). - Analyzes various types of DoS attacks, such as flooding attacks, reflection attacks, and amplification attacks, and explores how these attacks exploit intermediary nodes. - Discusses new trends in DDoS attacks targeting the Internet of Things (IoT) and cloud computing environments. 4. **Intrusion Detection Systems (IDS)**: - Introduces the concept of intrusion detection systems and their importance in modern network security. - Explores techniques for intrusion detection using methods such as Markov chains, multi-pattern string matching, and signature matching algorithms. - Analyzes the role of firewalls as the first line of defense in network security and the challenges they face in cloud environments. In summary, the paper aims to comprehensively summarize the latest research advancements in the field of computer security and proposes some future research directions.