Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach

It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based Net...

Full description

Bibliographic Details
Main Authors: Mohammed Abdulaziz Al Naeem, Adamu Abubakar, M. M. Hafizur Rahman
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9241700/
id doaj-272718781d4943d39670aab1ddbfdde8
record_format Article
spelling doaj-272718781d4943d39670aab1ddbfdde82021-03-30T04:15:47ZengIEEEIEEE Access2169-35362020-01-01819755419756610.1109/ACCESS.2020.30343839241700Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security BreachMohammed Abdulaziz Al Naeem0Adamu Abubakar1https://orcid.org/0000-0002-9137-3974M. M. Hafizur Rahman2https://orcid.org/0000-0001-6808-3373Department of Computer Networks and Communications, College of Computer Science and Information Technology, King Faisal University, Al Ahsa, Saudi ArabiaDepartment of Computer Science, International Islamic University Malaysia, Kuala Lumpur, MalaysiaDepartment of Computer Networks and Communications, College of Computer Science and Information Technology, King Faisal University, Al Ahsa, Saudi ArabiaIt is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based Networking approach in this study. Two algorithms are proposed, utilizing single-path and multipath in transmission flow. Every path is potentially weak and a point of failure for which a network security can be breached. Two sets of rules, namely, “vulnerability rules policies” with “rules formulation” from the regions of connection recognized by Euler's theorem were outlined. The intent is to use these sets of rules in finding the point of failure the packet status that is leading to possible security breaches within network connections. The frequencies of the packets that are liable to create security breaches and the paths where they originate are analyzed. Well-formed packet originating from the least likely weak point of failure is associated the network security breach than malformed packets. This study has contributed to revealing that network security breaches are influenced by the paths with least likely point of failure from well-formed packets.https://ieeexplore.ieee.org/document/9241700/Well-formed packetmalformed packetpoint of failuresecurity breaches
collection DOAJ
language English
format Article
sources DOAJ
author Mohammed Abdulaziz Al Naeem
Adamu Abubakar
M. M. Hafizur Rahman
spellingShingle Mohammed Abdulaziz Al Naeem
Adamu Abubakar
M. M. Hafizur Rahman
Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach
IEEE Access
Well-formed packet
malformed packet
point of failure
security breaches
author_facet Mohammed Abdulaziz Al Naeem
Adamu Abubakar
M. M. Hafizur Rahman
author_sort Mohammed Abdulaziz Al Naeem
title Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach
title_short Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach
title_full Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach
title_fullStr Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach
title_full_unstemmed Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach
title_sort dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based Networking approach in this study. Two algorithms are proposed, utilizing single-path and multipath in transmission flow. Every path is potentially weak and a point of failure for which a network security can be breached. Two sets of rules, namely, “vulnerability rules policies” with “rules formulation” from the regions of connection recognized by Euler's theorem were outlined. The intent is to use these sets of rules in finding the point of failure the packet status that is leading to possible security breaches within network connections. The frequencies of the packets that are liable to create security breaches and the paths where they originate are analyzed. Well-formed packet originating from the least likely weak point of failure is associated the network security breach than malformed packets. This study has contributed to revealing that network security breaches are influenced by the paths with least likely point of failure from well-formed packets.
topic Well-formed packet
malformed packet
point of failure
security breaches
url https://ieeexplore.ieee.org/document/9241700/
work_keys_str_mv AT mohammedabdulazizalnaeem dealingwithwellformedandmalformedpacketsassociatedwithpointoffailurethatcausenetworksecuritybreach
AT adamuabubakar dealingwithwellformedandmalformedpacketsassociatedwithpointoffailurethatcausenetworksecuritybreach
AT mmhafizurrahman dealingwithwellformedandmalformedpacketsassociatedwithpointoffailurethatcausenetworksecuritybreach
_version_ 1724182058598662144