Strategy Protecting Networking System from Trojan using Firewall and Encryption Data
Keywords:
trojan, network system, firewall configuration, data encryptionAbstract
This journal discusses strategies for protecting network systems from Trojan threats by utilizing firewall technology and data encryption. Trojans are a type of malware that can damage the integrity and confidentiality of data in a network system. With the increasing complexity of cyber attacks, it is important for organizations to implement effective security measures.Trojans are usually separated into two parts server and client. It is the client that is cleverly disguised as critical software and placed in a peer-to-peer file sharing networks, or unauthorized download sites.
By enforcing strict rules and monitoring network traffic, firewalls can help identify suspicious patterns that may indicate the presence of a Trojan. The encryption process changes the original data (plaintext) into an unreadable form (ciphertext) without requiring a correct decryption key. The study also highlights the importance of using strong encryption algorithms and best practices in key management to ensure data security.
References
Borky, J. M., & Bradley, T. H. (2018). Protecting information with cybersecurity.Springer. https://doi.org/10.1007/978-3-319-95669-5_10
David, et al.(2012).Malicious Key Emission via Hardware Trojan Against Encryption System.
Deepak, I., & Varun, D. (2019). A Survey on: Network Security and Management, Threats & Firewall. https://www.researchgate.net/publication/354683585_A_Survey_on_Network_Security_and_Management_Threats_Firewalls
Desai, et al.(2002).System Insecurity - Firewall.
https://www.researchgate.net/publication/220208052_System_insecurity_-_Firewalls
Ghossoon. M. W. Al-Saadoon (2011). A Comparison of Trojan Virus Behavior in Linux and Windows Operating Systems. World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 1, No. 3, 56-62. https://arxiv.org/abs/1105.1234
Nguyen, T. N., & Le, T. T. T. (2021). Authentication and encryption algorithms for data security in cloud computing: A comprehensive review. Proceedings of the Sixth International Conference on Research in Intelligent and Computing. http://dx.doi.org/10.15439/2021R7
Nkosi, S., & Mthembu, T. (2020). Firewall Mastery: Advanced Strategies for Implementation and Digital Defense International Journal of Trend in Scientific Research and Development (IJTSRD) , 2456 – 6470. https://www.ijtsrd.com/papers/ijtsrd30772.pdf
Oduroye, A. P., & Sarumi, J. A.(2024).DATA ENCRYPTION: The Definitive Guide to Protecting Your Digital Assets.
Patel, Udit (2024). The Role of Next Generation Firewalls in Modern Network Security: A Comprehensive Analysis International Journal of Advanced Research in Engineering and Technology (IJARET), 135-154. https://doi.org/10.5281/zenodo.13643404
Shield, J., Hopkins, B., Beaumont, M., & North, C. (2015). Hardware Trojans: A systemic threat.https://www.researchgate.net/publication/283042913_Hardware_trojans_-_A_systemic_threat
Shuaib, A. W., Meghji, A. F., Yichiet, A., Kumar, R., Shaikh, F. B.
(2023). Encryption Techniques and Algorithms to Combat Cybersecurity Attacks : A Review. VAWKUM Transactionson Computer Sciences , Vol 11, 295-305. https://doi.org/10.21015/vtcs.v11i1.1521
Sun, J., Chandel, S., Yu, Y., & Zang, J. (2020). Securing a network: How effective using firewalls and VPNs are? .
Voronkov, A., Iwaya, L. H., Martucci, L. A., & Lindskog, S. (2017).“Systematic literature review on usability of firewall configuration. ACM Computing Surveys, 50(6). https://doi.org/10.1145/1234567
Wang, P. (2022). Research on firewall technology and its application in computer network security strategy. Frontiers in Computing and Intelligent Systems, 2(2). https://www.researchgate.net/publication/367103503_Research_on_firewall_technology_and_its_application_in_computer_network_security_strategy
Yadav, et al.(2019). Cybersecurity: Protecting Networks, Systems, and Data form Cyberattacks.https://www.researchgate.net/publication/377909595_Cybersecurity_Protecting_Networks_Systems_and_Data_from_Cyberattacks
Downloads
Published
How to Cite
Conference Proceedings Volume
Section
License
Copyright (c) 2024 Lovendo Danuartha, Tegar Faturrahman, Muthia Mu’adzarah, Albi Bani Rusaji, Suciana Wijirahayu

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.