Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.11.35

Development of Sustainable Home-Network Security Tool  

Hamid, Erman (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM))
Hasbullah, M. Syafiq E. (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM))
Harum, Norharyati (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM))
Anawar, Syarulnaziah (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM))
Ayop, Zakiah (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM))
Zakaria, Nurul Azma (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM))
Shah, Wahidah Md (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM))
Publication Information
International Journal of Computer Science & Network Security / v.21, no.11, 2021 , pp. 257-265 More about this Journal
Abstract
Home networking and its security issues are directly related. Previous studies have shown that home-network and understanding the security of it is a problem for non-technical users. The existing network management tools or ISP adapter tools are far too technical and difficult to be understood by ordinary home-network users. Its interface is not non-technical user-directed and does not address the home user's needs in securing their network. This paper presents an interactive security monitoring tool, which emphasizes support features for home-network users. The tool combines an interactive visual appearance with a persuasive approach that supports sustainability. It is not only an easy-to-use tool for all categories of home-network users but also acts as a monitoring feature for the user to secure their home-network.
Keywords
Home-network; Sustainable; Security Tools;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. A. Fadzil and N. Jaafar, "Sikap Pelajar Sekolah Menengah Arab Jabatan Agama Islam Melaka Terhadap Pembelajaran Bahasa Arab," e-Prosiding PASAK 4. 24-25 April 2019, vol. 4, no. April, pp. 191-202, 2019.
2 T. Al-Kadi, Z. Al-Tuwaijri, and A. Al-Omran, "Arduino Wi-Fi network analyzer," in Procedia Computer Science, 2013, vol. 21, pp. 522-529, doi: 10.1016/j.procs.2013.09.073.   DOI
3 A. Setiawan and A. I. Purnamasari, "Pengembangan Smart Home Dengan Microcontrollers ESP32 Dan MC-38 Door Magnetic Switch Sensor Berbasis Internet of Things (IoT) Untuk Meningkatkan Deteksi Dini Keamanan Perumahan," J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 3, no. 3, pp. 451-457, 2019, doi: 10.29207/resti.v3i3.1238.   DOI
4 D. Gajjar and A. Prajapati, "EasyChair Preprint Working of Offline Cloud Storage Using FTP , RDP and RPC with Router," Am. J. Eng. Res., vol. 5, no. 6, pp. 38-42, 2020.
5 D. E. Goncharov, S. V. Zareshin, R. V. Bulychev, and D. S. Silnov, "Vulnerability analysis of the Wifi spots using WPS by modified scanner vistumbler," in Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018, vol. 2018-Janua, pp. 48-51, doi: 10.1109/EIConRus.2018.8317027.   DOI
6 A. Moallem, "Why should home networking be complicated?," in Advances in Usability Evaluation: Part II, CRC Press, 2013, pp. 4169-4178.
7 R. Mortier et al., "Control and understanding: Owning your home network," 2012 Fourth Int. Conf. Commun. Syst. Networks (COMSNETS 2012), pp. 1-10, Jan. 2012, doi: 10.1109/COMSNETS.2012.6151322.   DOI
8 G. Conti and K. Abdullah, "Passive visual fingerprinting of network attack tools," in VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, 2004, pp. 45-54, doi: 10.1145/1029208.1029216.   DOI
9 J. L. Chen and K. C. Yen, "Transparent bridging support for bluetooth-IP service interworking," Int. J. Netw. Manag., vol. 12, no. 6, pp. 379-386, 2002, doi: 10.1002/nem.454.   DOI
10 A. Rahman, K. R. Kawshik, A. A. Sourav, and A.-A. Gaji, "Advanced Network Scanning," Am. J. Eng. Res., no. 5, pp. 38-42, 2016, [Online]. Available: www.ajer.org.
11 S. Ibnu Hunais, M. Yamin, "Penerapan Keamanan Jaringan Menggunakan Metode Host Based IDPS WLAN dan LAM Berbasis Web dan SMS Gateway," J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 1, p. 97, 2020.   DOI
12 Z. Ali, F. Naz, Javed, M. Qurban, M. Yasir, and S. Jehangir, "Analysis of VoIP over wired & wireless network with implementation of QoS CBWFQ & 802.11e," Int. J. Comput. Netw. Inf. Secur., vol. 12, no. 1, pp. 43-39, 2020, doi: 10.5815/ijcnis.2020.01.05.   DOI
13 R. C. Joshi and E. S. Pilli, "Network Forensic Tools," in Fundamentals of Network Forensics., 2016, pp. 71-93.
14 W. Da Chen and Z. X. Lin, "A Prototype Development of the Smart Mousetrap System Equipped with LoRa," 2018, doi: 10.1109/ICCE-China.2018.8448569.   DOI
15 M. Mongiovi, P. Bogdanov, R. Ranca, E. E. Papalexakisy, C. Faloutsos, and A. K. Singh, "NetSpot: Spotting significant anomalous regions on dynamic networks," in Proceedings of the 2013 SIAM International Conference on Data Mining, SDM 2013, 2013, pp. 28-36, doi: 10.1137/1.9781611972832.4.   DOI
16 I. P. A. E. Pratama and P. A. Dharmesta, "Implementasi Wireshark Dalam Melakukan Pemantauan Protocol Jaringan ( Studi Kasus : Intranet Jurusan Teknologi Informasi Universitas Udayana )," Mantik Penusa, vol. 3, no. 1, pp. 94-99, 2019.
17 B. Camburn et al., "Design prototyping methods: State of the art in strategies, techniques, and guidelines," Des. Sci., vol. 3, 2017, doi: 10.1017/dsj.2017.10.   DOI
18 S. A. Soomro, H. Casakin, and G. V. Georgiev, "Sustainable design and prototyping using digital fabrication tools for education," Sustain., vol. 13, no. 3, pp. 1-17, 2021, doi: 10.3390/su13031196.   DOI
19 E. Hamid, N. Bahaman, A. Jaafar, A. M. Choo, and A. A. Malek, "Development of home network sustainable interface tools," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 2, pp. 72-76, 2019, doi: 10.14569/ijacsa.2019.0100210.   DOI
20 W. Rahman, P. T. Nguyen, M. Rusliyadi, E. Laxmi Lydia, and K. Shankar, "Network monitoring tools and techniques uses in the network traffic management system," Int. J. Recent Technol. Eng., vol. 8, no. 2 Special Issue 11, pp. 4182-4188, 2019, doi: 10.35940/ijrte.B1603.0982S1119.   DOI
21 M. A. Doshi and P. Sharma, "Digital Forensics Analysis for Network Related Data," Int. Res. J. Eng. Technol., vol. 7, no. 4, pp. 1390-1398, 2020.
22 C. Science, S. Madden, T. Supervisor, and A. Smith, "iNav: A Hybrid Approach to WiFi Localization and," 2008.
23 M. Akbar, "Perancangan Software Ids Snort Untuk Pendeteksian Serangan Interruption (Netcut) Pada Jaringan Wireless," J. INSTEK (Informatika Sains dan Teknol., vol. 3, no. 1, pp. 121-129, 2018, doi: 10.24252/instek.v3i1.5007.   DOI
24 R. Yu, X. Zhang, and M. Zhang, "Smart Home Security Analysis System Based on the Internet of Things," in 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2021, 2021, pp. 596-599, doi: 10.1109/ICBAIE52039.2021.9389849.   DOI
25 M. R. Kurniawan and L. O. Sari, "Analisis Sistem Keamanan Wireless Local Area Network (Wlan) Pada Proses Tethering," Jom FTEKNIK, vol. 5, no. 2, pp. 1-7, 2018.
26 A. Almaarif and S. Yazid, "ARP Cache Poisoning sebagai Teknik Alternatif untuk Membatasi Penggunaan Bandwidth berbasis Waktu," J. Rekayasa Sist. Ind., vol. 5, pp. 108-113, 2018, doi: 10.25124/jrsi.v6i1.367.   DOI
27 N. Castelli, C. Ogonowski, T. Jakobi, M. Stein, G. Stevens, and V. Wulf, "What Happened in my Home ?: An End-User Development Approach for Smart Home Data Visualization," in 2017 CHI Conference on Human Factors in Computing Systems, 2017, pp. 853-866.
28 E. Hamid, M. C. Ang, and A. Jaafar, "A Comparative Study on Visualization Technique for Home Network," in Progress in Intelligent Decision Science, 2021, pp. 71-85.
29 S. T. Ali, V. Sivaraman, A. Radford, and S. Jha, "A Survey of Securing Networks Using Software Defined Networking," IEEE Trans. Reliab., vol. 64, no. 3, pp. 1086-1097, 2015, doi: 10.1109/TR.2015.2421391.   DOI
30 S. S. I. Samuel, "A review of connectivity challenges in IoT-smart home," in 2016 3rd MEC International Conference on Big Data and Smart City, ICBDSC 2016, 2016, pp. 364-367, doi: 10.1109/ICBDSC.2016.7460395.   DOI
31 V. C. Shekar, S. U. Rahman, S. V. B. DB, A. Mateen, and R. A.S, "Enhanced Network Security for IoT based Home Automation System," Int. J. Emerg. Res. Manag. Technol., vol. 6, no. 6, p. 278, 2018, doi: 10.23956/ijermt.v6i6.282.   DOI
32 J. A. Yani, N. Palembang, and S. Selatan, "Evaluasi Penerapan Autentikasi Pengguna Wireless LAN Berbasis Radius Server Universitas Bina Darma," J. Mhs. Tek. Inform., no. 12, 2014.
33 V. Ndatinya, Z. Xiao, V. R. Manepalli, K. Meng, and Y. Xiao, "Network forensics analysis using Wireshark," Int. J. Secur. Networks, vol. 10, no. 2, pp. 91-106, 2015, doi: 10.1504/IJSN.2015.070421.   DOI
34 J. Hong, A. Levy, L. Riliskis, and P. Levis, "Don't talk unless i say so! securing the internet of things with default-off networking," in Proceedings - ACM/IEEE International Conference on Internet of Things Design and Implementation, IoTDI 2018, 2018, pp. 117-128, doi: 10.1109/IoTDI.2018.00021.   DOI
35 N. binti Harum, N. A. Zakaria, N. A. Emran, Z. Ayop, and S. Anawar, "Smart book reader for visual impairment person using IoT device," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 2, pp. 251-255, 2019, doi: 10.14569/ijacsa.2019.0100233.   DOI
36 A. Crabtree, R. Mortier, T. Rodden, and P. Tolmie, "Unremarkable networking: the home network as a part of everyday life," Proc. Des. Interact. Syst. Conf. ACM., pp. 554-563, 2012, Accessed: Mar. 20, 2014. [Online]. Available: http://dl.acm.org/citation.cfm?id=2318039.
37 C. Wilson, T. Hargreaves, and R. Hauxwell-Baldwin, "Benefits and risks of smart home technologies," Energy Policy, vol. 103, no. January, pp. 72-83, 2017, doi: 10.1016/j.enpol.2016.12.047.   DOI
38 E. Anthi, S. Ahmad, O. Rana, G. Theodorakopoulos, and P. Burnap, "EclipseIoT: A secure and adaptive hub for the Internet of Things," Comput. Secur., vol. 78, pp. 477-490, 2018, doi: 10.1016/j.cose.2018.07.016.   DOI
39 D. Avasthi, "Network Forensic Analysis with Efficient Preservation for SYN Attack.," Int. J. Comput. Appl., vol. 46, no. 24, pp. 17-22, 2012, [Online]. Available: http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:Network+Forensic+Analysis+with+Efficient+Preservation+for+SYN+Attack#0.
40 E. Nasr, M. Jalloul, J. Bachalaany, and R. Maalouly, "Wi-Fi Network Vulnerability Analysis and Risk Assessment in Lebanon," MATEC Web Conf., vol. 281, p. 05002, 2019, doi: 10.1051/matecconf/201928105002.   DOI