IMPLEMENTING NETWORK SEGMENTATION TO MINIMIZE CYBERATTACK IMPACTS: LESSONS LEARNED FROM DESIGNING AND EXECUTING NETWORK SEGMENTATION STRATEGIES

Authors

  • Wasif Khan Author

Keywords:

Cybersecurity, Network Segmentation, SDN, Micro-Segmentation, Zero Trust, AI, ML, 5G, IOT, SIEM, Compliance, Automation

Abstract

Today’s business infrastructure is linked in a global matrix, which has raised the threat of disruption through cybercrime, making it essential for the best strategies in cybersecurity. Network segmentation has become an important preventive measure of these threats to prevent the loss of valuable resources, minimize vulnerability, and contain breaches. This article is focused on the discussion of the principles of network segmentation and the debate on the benefits and potential challenges of this concept, which will help to understand how to design and implement efficient network segmentation plans. This paper aims to give organizations that want to improve their cybersecurity a straightforward guide on selecting and implementing new technologies for competitive advantage through a critical understanding of emerging technologies like SDN and micro-segmentation. The paper also discusses growing trends such as ZTA, AI, ML, 5G, and IoT, which, according to the authors, require constant monitoring, optimization, and relevance to organizational business goals to ensure robust network security against increasingly diverse threats.

References

Ali, A., Warren, D., & Mathiassen, L. (2017). Cloud-based business services innovation: A risk management model. International Journal of Information Management, 37(6), 639-649.

Alrawi, O., Lever, C., Antonakakis, M., & Monrose, F. (2019, May). Sok: Security evaluation of home-based iot deployments. In 2019 IEEE symposium on security and privacy (sp) (pp. 1362-1380). IEEE.

Aurelien, J. (2021). Exploring Effective Defensive Cybersecurity Strategies for Small Businesses. Colorado Technical University.

Bakhshi, T. (2017). State of the art and recent research advances in software defined networking. Wireless Communications and Mobile Computing, 2017(1), 7191647.

Balali, V., & Golparvar-Fard, M. (2016). Evaluation of multiclass traffic sign detection and classification methods for US roadway asset inventory management. Journal of Computing in Civil Engineering, 30(2), 04015022.

Bövers, J., & Hoon, C. (2021). Surviving disruptive change: The role of history in aligning strategy and identity in family businesses. Journal of Family Business Strategy, 12(4), 100391.

Brotspies, H., & Weinstein, A. (2019). Rethinking business segmentation: a conceptual model and strategic insights. Journal of strategic marketing, 27(2), 164-176.

Carayannis, E. G., Grigoroudis, E., Del Giudice, M., Della Peruta, M. R., & Sindakis, S. (2017). An exploration of contemporary organizational artifacts and routines in a sustainable excellence context. Journal of Knowledge Management, 21(1), 35-56.

Chatzidakis, A., Hakim, J., Litter, J., & Rottenberg, C. (2020). The care manifesto: The politics of interdependence. Verso Books.

Chouhan, S. S., Kaul, A., & Singh, U. P. (2019). Image segmentation using computational intelligence techniques. Archives of Computational Methods in Engineering, 26, 533-596.

Couffe, C., & Michael, G. A. (2017). Failures due to interruptions or distractions: A review and a new framework. The American journal of psychology, 130(2), 163-181.

Dang-Pham, D., Pittayachawan, S., & Bruno, V. (2017). Exploring behavioral information security networks in an organizational context: An empirical case study. Journal of Information Security and Applications, 34, 46-62.

Dhillon, G., Syed, R., & Pedron, C. (2016). Interpreting information security culture: An organizational transformation case study. Computers & Security, 56, 63-69.

Dimitrakos, T., Dilshener, T., Kravtsov, A., La Marra, A., Martinelli, F., Rizos, A., ... & Saracino, A. (2020, December). Trust aware continuous authorization for zero trust in consumer internet of things. In 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom) (pp. 1801-1812). IEEE.

Frigård, J. (2019). Security Information and Event Management Systems Monitoring Automation Systems (Master's thesis).

Gill, A. (2018). Developing a real-time electronic funds transfer system for credit unions. International Journal of Advanced Research in Engineering and Technology (IJARET), 9(1), 162-184.

Gupta, L. (2019). Management and security of multi-cloud applications. Washington University in St. Louis.

Hatcher, W. G., & Yu, W. (2018). A survey of deep learning: Platforms, applications and emerging research trends. IEEE access, 6, 24411-24432.

Huang, D., Chowdhary, A., & Pisharody, S. (2018). Software-Defined networking and security: from theory to practice. CRC press.

Khodadadi, F., Dastjerdi, A. V., & Buyya, R. (2016). Internet of things: an overview. Internet of things, 3-27.

Kostakis, O., Tatti, N., & Gionis, A. (2017). Discovering recurring activity in temporal networks. Data Mining and Knowledge Discovery, 31(6), 1840-1871.

Li, R., Zheng, S., Zhang, C., Duan, C., Su, J., Wang, L., & Atkinson, P. M. (2021). Multiattention network for semantic segmentation of fine-resolution remote sensing images. IEEE Transactions on Geoscience and Remote Sensing, 60, 1-13.

Loukaka, A. (2019). Advanced Methods to Detect Intricate Cybersecurity Exploits: An Exploratory Qualitative Inquiry (Doctoral dissertation, Capella University).

Mhaskar, N., Alabbad, M., & Khedri, R. (2021). A formal approach to network segmentation. Computers & Security, 103, 102162.

Muhammad, T. (2019). Revolutionizing Network Control: Exploring the Landscape of Software-Defined Networking (SDN). International Journal of Computer Science and Technology, 3(1), 36-68.

Nyati, S. (2018). Revolutionizing LTL Carrier Operations: A Comprehensive Analysis of an Algorithm-Driven Pickup and Delivery Dispatching Solution. International Journal of Science and Research (IJSR), 7(2), 1659-1666.

Nyati, S. (2018). Transforming Telematics in Fleet Management: Innovations in Asset Tracking, Efficiency, and Communication. International Journal of Science and Research (IJSR), 7(10), 1804-1810.

Pereira, T., Barreto, L., & Amaral, A. (2017). Network and information security challenges within Industry 4.0 paradigm. Procedia manufacturing, 13, 1253-1260.

Rak, J., Girão-Silva, R., Gomes, T., Ellinas, G., Kantarci, B., & Tornatore, M. (2021). Disaster resilience of optical networks: State of the art, challenges, and opportunities. Optical Switching and Networking, 42, 100619.

Rezaei, J., Wang, J., & Tavasszy, L. (2015). Linking supplier development to supplier segmentation using Best Worst Method. Expert Systems with Applications, 42(23), 9152-9164.

Sengupta, S., Chowdhary, A., Sabur, A., Alshamrani, A., Huang, D., & Kambhampati, S. (2020). A survey of moving target defenses for network security. IEEE Communications Surveys & Tutorials, 22(3), 1909-1941.

Shahid, M. A., Islam, N., Alam, M. M., Su’ud, M. M., & Musa, S. (2020). A comprehensive study of load balancing approaches in the cloud computing environment and a novel fault tolerance approach. IEEE Access, 8, 130500-130526.

Simkin, L. (2016). Segmentation. In The Marketing Book (pp. 271-294). Routledge.

Stafford, V. (2020). Zero trust architecture. NIST special publication, 800, 207.

Ventre, P. L., Salsano, S., Polverini, M., Cianfrani, A., Abdelsalam, A., Filsfils, C., ... & Clad, F. (2020). Segment routing: A comprehensive survey of research activities, standardization efforts, and implementation results. IEEE Communications Surveys & Tutorials, 23(1), 182-221.

Wang, B., Qi, Z., Ma, R., Guan, H., & Vasilakos, A. V. (2015). A survey on data center networking for cloud computing. Computer Networks, 91, 528-547.

Wu, F., Li, X., Sangaiah, A. K., Xu, L., Kumari, S., Wu, L., & Shen, J. (2018). A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Generation Computer Systems, 82, 727-737

Downloads

Published

2021-03-31

How to Cite

Wasif Khan. (2021). IMPLEMENTING NETWORK SEGMENTATION TO MINIMIZE CYBERATTACK IMPACTS: LESSONS LEARNED FROM DESIGNING AND EXECUTING NETWORK SEGMENTATION STRATEGIES. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET), 12(03), 992-1015. https://lib-index.com/index.php/IJARET/article/view/IJARET_12_03_092