A Survey on Network Security: From Firewalls To Ai-Powered Threat Detection
Keywords:
Intrusion Detection Systems, IDS, Firewalls, Honeypots, Ai-Powered Threat Detection, Iot Botnets, Blockchain SecurityAbstract
Over the years, network security has moved totally away from the original barbaric measures in defence and has moved on to even more sophisticated and complicated cyber threat opportunities to solve the problem. This paper presents a complete overview of network security measures, tracing the route of their evolution from outdated firewalls and intrusion detection systems (IDS) to such advanced AI technologies (AI)-based threat detection solutions. The research study introduces the reader to various security devices such as firewall, honeypots, and machine learning-based intrusion detection, among other security measures, as well as blockchain and quantum cryptography as well as new technologies. The main idea is using modern AI methods such as machine learning and behavioural analysis for the purpose of threats prevention. Besides, the paper may be identified as a communication link, sending data about honeypot attacks and IoT botnets and through the gained experience from various results. The research swathe presents the main concepts, challenges, and future paths in network security and takes a deep look into the requirement of continuous advancements to defend against the changes in the world of cyber threats. Through the analysis of multiple research contributions, the paper is a useful data one can use to understand the current situation and how network security is developing.
DOI: https://doi.org/10.24321/3051.4304.202508
References
J. M. Pittman, K. Hoffpauir, and N. Markle, ‘‘Primer—A tool for testing honeypot measures of effectiveness,’’ 2020, arXiv:2011.00582.
E. Kheirkhah, S. M. P. Amin, H. A. J. Sistani, and H. Acharya, ‘‘An experimental study of SSH attacks by using honeypot decoys,’’ Indian J. Sci.Technol., vol. 6, no. 12, pp. 1–12, Dec. 2013.
C. Valli, P. Rabadia, and A. Woodward, ‘‘Patterns and patter—An investigation into SSH activity using kippo honeypots,’’ in Proc. Austral. Digit. Forensics Conf., 2013, pp. 1–10.