Ismail Ahmed Almaazmi, Mohammed Saeed Al Shehhi, Omar Alkhoori, Salem Jumah Al Shehhi, Yasir Hamid
{"title":"数据二极管用于网络安全:综述","authors":"Ismail Ahmed Almaazmi, Mohammed Saeed Al Shehhi, Omar Alkhoori, Salem Jumah Al Shehhi, Yasir Hamid","doi":"10.1109/ICAIoT57170.2022.10121887","DOIUrl":null,"url":null,"abstract":"The rapid growth in network usage and availability has exposed this field to denser and more sophisticated attacks. Sensitive and critical data has been transported over those network nodes and devices, which made them an attack vector to be exploited to gain information or data. To uphold the advantages of the networked systems some data need to be sent out over the highly secure channel. Previous technologies like Firewalls and ACLs being used to pass the data from a highly secure logical area to a lower logical area due to their software nature are proving to be fighting a losing battle with the attackers. Therefore, in the recent past physical security device Aka. Data Diodes which are secure by design and have no documented evidence of flow being reversed are gaining more attention. Unlike software, parameters can tamper, and that leads it to be implemented for those situations in which data need to be secured and protected, while still ensuring full separation between the outside world and the inside world, as data diode can be ranged depending on their complexity from EVL 1 up to EVL 3 in terms of their security strength. In this paper, we provide a comprehensive review of the recent research efforts spared for the data-diodes ranging from their manufacturing to their applications. Furthermore, the paper presents a comparison of data-diodes from options offered by reputed vendors, highlighting the strengths and weekness of each of them.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"144 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data Diode for Cyber-security: A Review\",\"authors\":\"Ismail Ahmed Almaazmi, Mohammed Saeed Al Shehhi, Omar Alkhoori, Salem Jumah Al Shehhi, Yasir Hamid\",\"doi\":\"10.1109/ICAIoT57170.2022.10121887\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid growth in network usage and availability has exposed this field to denser and more sophisticated attacks. Sensitive and critical data has been transported over those network nodes and devices, which made them an attack vector to be exploited to gain information or data. To uphold the advantages of the networked systems some data need to be sent out over the highly secure channel. Previous technologies like Firewalls and ACLs being used to pass the data from a highly secure logical area to a lower logical area due to their software nature are proving to be fighting a losing battle with the attackers. Therefore, in the recent past physical security device Aka. Data Diodes which are secure by design and have no documented evidence of flow being reversed are gaining more attention. Unlike software, parameters can tamper, and that leads it to be implemented for those situations in which data need to be secured and protected, while still ensuring full separation between the outside world and the inside world, as data diode can be ranged depending on their complexity from EVL 1 up to EVL 3 in terms of their security strength. In this paper, we provide a comprehensive review of the recent research efforts spared for the data-diodes ranging from their manufacturing to their applications. Furthermore, the paper presents a comparison of data-diodes from options offered by reputed vendors, highlighting the strengths and weekness of each of them.\",\"PeriodicalId\":297735,\"journal\":{\"name\":\"2022 International Conference on Artificial Intelligence of Things (ICAIoT)\",\"volume\":\"144 4\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Artificial Intelligence of Things (ICAIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIoT57170.2022.10121887\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIoT57170.2022.10121887","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The rapid growth in network usage and availability has exposed this field to denser and more sophisticated attacks. Sensitive and critical data has been transported over those network nodes and devices, which made them an attack vector to be exploited to gain information or data. To uphold the advantages of the networked systems some data need to be sent out over the highly secure channel. Previous technologies like Firewalls and ACLs being used to pass the data from a highly secure logical area to a lower logical area due to their software nature are proving to be fighting a losing battle with the attackers. Therefore, in the recent past physical security device Aka. Data Diodes which are secure by design and have no documented evidence of flow being reversed are gaining more attention. Unlike software, parameters can tamper, and that leads it to be implemented for those situations in which data need to be secured and protected, while still ensuring full separation between the outside world and the inside world, as data diode can be ranged depending on their complexity from EVL 1 up to EVL 3 in terms of their security strength. In this paper, we provide a comprehensive review of the recent research efforts spared for the data-diodes ranging from their manufacturing to their applications. Furthermore, the paper presents a comparison of data-diodes from options offered by reputed vendors, highlighting the strengths and weekness of each of them.