The topic that I am using for my proposed research is network security. It is important for me to find articles that can prevent attacks and to harden security points within the network to reduce the chances of a breach in the network.
Search # 1
The database I used is Computer Source with the modifiers of full text and peer review. the search term was network security. which resulted in 282 results
The usefulness of the search did bring up a decent number of articles that are relevant to what I am researching, however some of them I have already covered in the past.
Annotation
Bi, K., Han, D., Zhang, G., Li, K.-C., & Castiglione, A. (2021). K maximum probability attack paths generation algorithm for target nodes in networked systems. International Journal of Information Security, 20(4), 535–551. https://doi.org/10.1007/s10207-020-00517-4
This article goes over what administrators need to be aware of with abnormal behaviors. the article does go over what needs to be looked at when spotting the abnormal behaviors and what security risks does it present.
Search # 2
The database I used is Computer Source with the modifiers of full text and peer review. the search term was network malware. which resulted in 6 results
This was a miss on being useful. out of the 6 results one article does come close to being useful. however, the rest is not really useful in any way.
Annotation
PAPADOGIANNAKI, E., & IOANNIDIS, S. (2021). A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. ACM Computing Surveys, 54(6), 1–35. https://doi.org/10.1145/3457904
This article mainly went over the encryption protocols used in networking. which then lead to malware taking advantage of these protocols and spread to other machines on the network. the article does go into network traffic as well, but the main point was malware and encryption protocols.
search # 3
The database I used is Computer Source with the modifiers of full text and peer review. the search term was network defense. which resulted in 8 results
This search was a lot better than the last search done. there are about four to five articles that could be useful. I would be coming back to search to continue reading the other articles to see if they would fit in my paper.
Annotation
Mu, C., Yu, M., Li, Y., & Zang, W. (2014). Risk balance defense approach against intrusions for network server. International Journal of Information Security, 13(3), 255–269. https://doi.org/10.1007/s10207-013-0214-9
This article goes over a new defense approach when protecting networks servers. which could decrease the risk of intrusion into these systems. the way they have it setup is by creating modules that would actively monitor and block any unauthorized access to the network servers.
Search # 4
The database I used is Computer Source with the modifiers of full text and peer review. the search term was network AND ddos attack. which resulted in 28 results.
The search usefulness is mostly mixed. there are some good articles that could be used and then there are some that cover a different subject that I am not looking into.
Annotation
Malialis, K., Devlin, S., & Kudenko, D. (2015). Distributed reinforcement learning for adaptive and robust network intrusion response. Connection Science, 27(3), 234–252. https://doi.org/10.1080/09540091.2015.1031082
The article covers DDoS attacks on network routers. they did a test on their own networks to see if they can reinforce the network to reduce the impact of being DDoS. The article does talk about a effective way of reducing the impact on the network side allowing normal activities to continue.
Search # 5
Computer source database with the modifiers or full text and peer review. The search term was network security management. the number of results is nine.
Even though the search came back with a small amount of results a decent amount of them could be used for what I am looking into. so, I would have to say that this was a useful search.
Annotation
Silva, H., Santos, A., & Nogueira, M. (2015). Routing management for performance and security tradeoff in wireless mesh networks. International Journal of Information Security, 14(1), 35–46. https://doi.org/10.1007/s10207-014-0246-9
This article was good in a sense of what it talked about. it mainly talked about the tradeoffs between security and performance on a mesh network. it goes on to talk about where the balance should be for protecting the network while still not taking a major performance hit in the speed of the network. another part of the article was talking about how to make the network stronger with adaptive routing.
Have I hit a saturation point?
In a sense yes. doing these blog posts have open up a huge amount of information that I can look into. with the searches that I did above along with the searches in past I did find out that I mainly used computer source database to find the articles I was looking for. there were only a couple of times that I noticed that a search did not yield the results that I was looking for and that was because of key words. I was not thinking of too many keywords. now does that mean I will stop looking for more sources? No, there are a few articles that I would like to go visit to see If I can use them in this research.