A Study on Air-Gap Networks

被引:0
作者
Rajkumar, Mohan N. A. [1 ]
Sundharakumar, K. B. [1 ]
机构
[1] Shiv Nadar Univ Chennai, Dept CSE, Chennai, India
来源
2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024 | 2024年
关键词
Airgap; Cyber attacks; network isolation;
D O I
10.1109/CITIIT61487.2024.10580382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increase in the internet dependence over the last few years, cyberattacks have manifested in various shapes and forms, such as hacking and malware distribution. Cyberattacks have caused collateral damage for the individuals as well as the organizations, by leaking information, bringing down systems, and damaging websites and networks. The implementation of network segregation technology has become imperative in mitigating the increasing occurrences of cyberattacks and safeguarding critical data belonging to nations and various industries. Air gapping is the act of isolating a computer or other device from any other device. Isolation ensures placing the air-gapped device in a separate physical location. This paper examines the air-gap network by studying the air-gap network and understanding the issues, problems, and practical challenges in implementing the network. The results of this survey and the subsequent analysis are intended to aid organizations in safeguarding their information by offering insights into air-gap networks, attacks, and prevailing trends in this domain.
引用
收藏
页数:6
相关论文
共 10 条
[1]  
Cusick James J, 2022, Design and Construction of a Dark Site with Air Gap: A Prototype for Improved Business Continuity Resiliency
[2]  
eejournal, 2021, About us
[3]  
helpdeskgeek, 2020, About us
[4]  
inductiveautomation, 2018, WHAT IS SCADA
[5]   Air Gap Fiber Fabry-Perot Interferometer for Highly Sensitive Micro-Airflow Sensing [J].
Lee, Cheng-Ling ;
Hong, Wan-Yu ;
Hsieh, Hsin-Jung ;
Weng, Zi-Yu .
IEEE PHOTONICS TECHNOLOGY LETTERS, 2011, 23 (13) :905-907
[6]   Evolution of ransomware [J].
O'Kane, Philip ;
Sezer, Sakir ;
Carlin, Domhnall .
IET NETWORKS, 2018, 7 (05) :321-327
[7]  
Rose K., 2015, INTERNET SOC ISOC, V80, P1, DOI DOI 10.1017/CBO9781107415324.004
[8]  
samsung, US
[9]   Real-Time Network Intrusion Prevention System Based on Hybrid Machine Learning [J].
Seo, Wooseok ;
Pak, Wooguil .
IEEE ACCESS, 2021, 9 :46386-46397
[10]  
thesslstore, 2018, About us