Frontiers in Emerging Computer Science and Information Technology

  1. Home
  2. Archives
  3. Vol. 1 No. 1 (2024): Volume01 Issue01 2024 December
  4. CS & IT
Frontiers in Emerging Computer Science and Information Technology

Article Details Page

Characterizing Adversarial Behaviors in Distributed Network Architectures: A Comprehensive Classification and Detection Framework

Authors

  • Elena Khouri Department of Computer Science, Northern Institute of Technology, Oslo, Norway
  • Dr. Mei-Ling Zhang School of Information Engineering, Pacific Tech University, Taipei, Taiwan

Keywords:

Adversarial behaviors, distributed network architectures, network security, intrusion detection, attack classification, anomaly detection

Abstract

Distributed network systems, encompassing cloud computing, Software-Defined Networking (SDN), Internet of Things (IoT), and emerging blockchain technologies, form the backbone of modern digital infrastructure. However, their inherent complexity, dynamic nature, and expansive attack surface present significant security challenges. This article provides a comprehensive analysis of prevalent adversarial behaviors targeting these distributed environments. It proposes a classification framework for various attack patterns, detailing their mechanisms and impacts across different layers and technologies. Furthermore, it explores a range of detection approaches, from traditional signature-based methods to advanced machine learning and AI-driven techniques, evaluating their applicability and limitations in identifying sophisticated threats. The aim is to offer a holistic understanding of the threat landscape and lay the groundwork for developing more robust and adaptive security solutions for distributed network systems.

Downloads

Published

2024-12-22

How to Cite

Elena Khouri, & Dr. Mei-Ling Zhang. (2024). Characterizing Adversarial Behaviors in Distributed Network Architectures: A Comprehensive Classification and Detection Framework. Frontiers in Emerging Computer Science and Information Technology, 1(1), 23–28. Retrieved from https://irjernet.com/index.php/fecsit/article/view/5