Research Paper On Operating System Security
Research Paper On Operating System Security
On
Submitted
by:
Submitted
To:
Lovely Professional
University
Phagwara, Punjab.
Operating System (OS): Security
Approach and Practices to Security
Functionality: Firewalls monitor and log Firewalls play a vital role in protecting systems
activity between different security domains, and networks from unauthorized access and
restricting traffic based on specified rules and malicious activities. They are deployed
criteria. They can allow or block traffic types like strategically to enforce security policies and
HTTP, Telnet, SSH, etc., based on organizational safeguard sensitive data, but they also require
policies. careful management and regular updates to
address emerging threats and vulnerabilities in the
De-Militarized Zone (DMZ): A common cybersecurity landscape. To provide an idea
firewall architecture involves setting up a DMZ figure 5 provides an illustration to better
between the internal network and the outside understand the matter. An overall visualization of
world. The DMZ allows outside computers to
the findings is provided in figure 6 for better encryption, they offer strong security due to the
understanding. infeasibility of deriving the private key from the
public key. Thses algorithms are based on hard to
solve mathematical problems. There also are two
further standards to these algorithms.
The algorithms used in the working of the The encrypting algorithm works good with
encryption and firewall protection have their own passwords, biometrics and data encryption.
different types and different metrices. The different Furthermore, to protect the network and
key algorithms used for encryption are as follows: systems, firewalls are used as the safety
measures. There are majorly three types of
Symmetric Encryption Algorithms: These firewall algorithms:
algorithms are a class of cryptographic techniques
which uses the same key for both encryption and Packet Processing Rate (PPS): It
decryption. These algorithm are reliable due to their measures the capability of a network
speed and efficiency which helps in protection of device, such as a firewall or intrusion
large volume of data. These algorithms have two detection system (IDS), to handle data
standards. packets per second. High PPS is critical
for real-time processing of large volumes
1. The AES (Advanced Encryption Standard) of data in high-speed networks. Some of
uses block cypher for data encryption. It the recent studies shows how it helps in
has its own variants named AES-128 and maintaining the firewall algorithm.
AES-256 both representing their key size. It
operates on 128-bit blocks and supports 1. Software Firewalls: The average PPS of
128, 192, 256-bit key lengths. This is 250,000 to 500,000 in general-purpose
widely used in VPNs and OS disk software firewalls like iptables on
encryption tools e.g. BitLocker. commodity hardware. Performance
2. The DES (Data Encryption Standard) 3DES improves with optimized rulesets but
(Triple DES) is an early standard with 56- degrades with high rule complexity.
bit key lengths. The DES is considered 2. Hardware Accelerated Systems: Specialized
insecure due to its brute-force vulnerability. devices using Field-Programmable Gate
The 3DES is used in scenarios where AES Arrays (FPGAs) or ASICs achieved PPS up
is unavailable but has high latency. to 50 million in high-end enterprise setups.
Example: Cisco's ASA firewall
Asymmetric Encryption Algorithms: demonstrated 40-50 million PPS in tests for
Asymmetric encryption algorithms are a class of data centers(2018).
cryptographic techniques that use two different keys: 3. Impact of Encryption: Encryption increases
a public key for encryption and a private key for CPU overhead, dropping PPS by 30%-40%
decryption. These algorithms are crucial for secure when using protocols like IPsec or TLS.
key exchange, digital signatures, and identity 4. 5G-Enabled Networks: New studies (2021)
verification. While slower than symmetric reveal systems handling over 100 million
PPS to support ultra-low latency and high The above analysis shows the working of some of
throughput demands of 5G infrastructure. the algorithms in encryption and firewall techniques.
These algorithms can vary as per the data that needs
False Positive Rate (FPR): It refers to the the security. However, some of these may use up
frequency at which an intrusion detection system low energy making them efficient to rely on. Below
incorrectly classifies benign activities as malicious. is a graphical comparison of energy consumption
It significantly impacts the usability and reliability and throughput of the day-to-day used algorithms.
of IDS systems.
[21] Stallings (2005). Operating Systems, [32] DupeFS: Leaking Data Over the
Internals and Design Principles. Pearson: Network With Filesystem
Prentice Hall. p.6. Deduplication Side Channels. Andrei
Bacs; Saidgani Musaev; Kaveh Razavi;
[22] "Desktop Operating System Market Cristiano Giuffrida; and Herbert
Share Worldwide". StatCounter Global Bos. In FAST, February 2022.
Stats. Archived from the original on 2
October 2023. Retrieved 3 October 2023. [33] Speculative Probing: Hacking Blind
in the Spectre Era. Enes Goktas; Kaveh
[23] "Mobile & Tablet Operating System Razavi; Georgios Portokalidis; Herbert Bos;
Market Share Worldwide". StatCounter and Cristiano Giuffrida. In CCS, November
Global Stats. Retrieved 2 October 2023. 2020. Pwnie Award for the Most Innovative
Research
[24] "Twenty Years of Linux according
to Linus Torvalds". ZDNet. April 13, [34] SecurePay: Strengthening Two-
2011. Archived from the original on Factor Authentication for Arbitrary
September 19, 2016. Retrieved Transactions. Radhesh Krishnan
September 19, 2016. Konoth; Björn Fischer; Wan Fokkink;
Elias Athanasopoulos; Kaveh Razavi;
[25] "What Is Linux: An Overview of the and Herbert Bos. In EuroS&P,
Linux Operating System". Medium. September 2020. Best Paper Award, US
11 April 2020. Retrieved 16 July 2023 Patent App. 17/775,322
Liu, F., Tang, G., Li, Y., Cai, Z., Zhang, X., &
Zhou, T. (2019). A survey on edge computing
systems and tools. Proceedings of the IEEE, 107(8),
1537–1562. https://doi.org/10.1109/jproc.2019.2920
341