数据二极管用于网络安全:综述

Ismail Ahmed Almaazmi, Mohammed Saeed Al Shehhi, Omar Alkhoori, Salem Jumah Al Shehhi, Yasir Hamid
{"title":"数据二极管用于网络安全:综述","authors":"Ismail Ahmed Almaazmi, Mohammed Saeed Al Shehhi, Omar Alkhoori, Salem Jumah Al Shehhi, Yasir Hamid","doi":"10.1109/ICAIoT57170.2022.10121887","DOIUrl":null,"url":null,"abstract":"The rapid growth in network usage and availability has exposed this field to denser and more sophisticated attacks. Sensitive and critical data has been transported over those network nodes and devices, which made them an attack vector to be exploited to gain information or data. To uphold the advantages of the networked systems some data need to be sent out over the highly secure channel. Previous technologies like Firewalls and ACLs being used to pass the data from a highly secure logical area to a lower logical area due to their software nature are proving to be fighting a losing battle with the attackers. Therefore, in the recent past physical security device Aka. Data Diodes which are secure by design and have no documented evidence of flow being reversed are gaining more attention. Unlike software, parameters can tamper, and that leads it to be implemented for those situations in which data need to be secured and protected, while still ensuring full separation between the outside world and the inside world, as data diode can be ranged depending on their complexity from EVL 1 up to EVL 3 in terms of their security strength. In this paper, we provide a comprehensive review of the recent research efforts spared for the data-diodes ranging from their manufacturing to their applications. Furthermore, the paper presents a comparison of data-diodes from options offered by reputed vendors, highlighting the strengths and weekness of each of them.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"144 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Diode for Cyber-security: A Review\",\"authors\":\"Ismail Ahmed Almaazmi, Mohammed Saeed Al Shehhi, Omar Alkhoori, Salem Jumah Al Shehhi, Yasir Hamid\",\"doi\":\"10.1109/ICAIoT57170.2022.10121887\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid growth in network usage and availability has exposed this field to denser and more sophisticated attacks. Sensitive and critical data has been transported over those network nodes and devices, which made them an attack vector to be exploited to gain information or data. To uphold the advantages of the networked systems some data need to be sent out over the highly secure channel. Previous technologies like Firewalls and ACLs being used to pass the data from a highly secure logical area to a lower logical area due to their software nature are proving to be fighting a losing battle with the attackers. Therefore, in the recent past physical security device Aka. Data Diodes which are secure by design and have no documented evidence of flow being reversed are gaining more attention. Unlike software, parameters can tamper, and that leads it to be implemented for those situations in which data need to be secured and protected, while still ensuring full separation between the outside world and the inside world, as data diode can be ranged depending on their complexity from EVL 1 up to EVL 3 in terms of their security strength. In this paper, we provide a comprehensive review of the recent research efforts spared for the data-diodes ranging from their manufacturing to their applications. Furthermore, the paper presents a comparison of data-diodes from options offered by reputed vendors, highlighting the strengths and weekness of each of them.\",\"PeriodicalId\":297735,\"journal\":{\"name\":\"2022 International Conference on Artificial Intelligence of Things (ICAIoT)\",\"volume\":\"144 4\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Artificial Intelligence of Things (ICAIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIoT57170.2022.10121887\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIoT57170.2022.10121887","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

网络使用和可用性的快速增长使该领域暴露于更密集和更复杂的攻击之下。敏感和关键数据已经通过这些网络节点和设备传输,这使得它们成为被利用来获取信息或数据的攻击媒介。为了保持网络系统的优势,一些数据需要通过高度安全的通道发送出去。以前的技术,如防火墙和acl,由于其软件特性而被用于将数据从高度安全的逻辑区域传递到较低的逻辑区域,被证明是在与攻击者进行一场失败的战斗。因此,在最近的过去物理安全设备又名。数据二极管的设计是安全的,并且没有文件证据表明流量被逆转,因此越来越受到关注。与软件不同,参数可以被篡改,这导致它适用于那些需要保护和保护数据的情况,同时仍然确保外部世界和内部世界之间的完全分离,因为数据二极管可以根据其安全强度从EVL 1到EVL 3的复杂性进行调整。在本文中,我们提供了一个全面的审查,最近的研究工作,从他们的制造到他们的应用范围内的数据二极管。此外,本文还对知名厂商提供的数据二极管进行了比较,突出了各自的优点和缺点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Data Diode for Cyber-security: A Review
The rapid growth in network usage and availability has exposed this field to denser and more sophisticated attacks. Sensitive and critical data has been transported over those network nodes and devices, which made them an attack vector to be exploited to gain information or data. To uphold the advantages of the networked systems some data need to be sent out over the highly secure channel. Previous technologies like Firewalls and ACLs being used to pass the data from a highly secure logical area to a lower logical area due to their software nature are proving to be fighting a losing battle with the attackers. Therefore, in the recent past physical security device Aka. Data Diodes which are secure by design and have no documented evidence of flow being reversed are gaining more attention. Unlike software, parameters can tamper, and that leads it to be implemented for those situations in which data need to be secured and protected, while still ensuring full separation between the outside world and the inside world, as data diode can be ranged depending on their complexity from EVL 1 up to EVL 3 in terms of their security strength. In this paper, we provide a comprehensive review of the recent research efforts spared for the data-diodes ranging from their manufacturing to their applications. Furthermore, the paper presents a comparison of data-diodes from options offered by reputed vendors, highlighting the strengths and weekness of each of them.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信