Application layer security for Internet communications: A comprehensive review, challenges, and future trends

被引:2
|
作者
Cevallos-Salas, David [1 ]
Estrada-Jimenez, Jose [1 ]
Guaman, Danny S. [1 ]
机构
[1] Escuela Politec Nacl, Fac Ingn Electr & Elect, Dept Elect Telecomunicac & Redes Informac, Ladron Guevara E11-253, Quito 170525, Ecuador
关键词
Application layer; Internet; Protocol; Security goal; Control; Threat; Vulnerability; Attack; Review; PROTOCOL; SYSTEM; WEB; ESTABLISHMENT; ARCHITECTURE; FRAMEWORK; DDOS;
D O I
10.1016/j.compeleceng.2024.109498
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security of Internet communications has traditionally been delegated to controls at lower layers of the Transmission Control Protocol/Internet / Internet Protocol (TCP/IP) architecture. However, the increasing complexity and severity of current Internet threats have rendered this approach insufficient, necessitating enhanced security measures at higher levels. This paper presents a comprehensive review of Application layer security for Internet communications, utilizing a novel classification scheme of existing literature based on standards and frameworks. Unlike previous studies, our proposed classification scheme encompasses all current approaches to security provision, security goals, types of attacks, and types of controls at the Application layer. Moreover, it analyzes security solutions for both standardized and proposed protocols. Our review is domain-agnostic and considers all existing contributions without age restrictions, allowing us to analyze the complete landscape beyond the conventional use of browsers for accessing Internet services and to understand the evolution of Application layer security from the Internet's inception. Our thorough review also identifies gaps, challenges, and forecasts future trends, serving as a baseline for future research. We conclude that the primary driver to secure the Application layer for Internet communications is the technological adaptation of standardized Application layer protocols to meet new requirements over time, which has given rise to new and dangerous threats, rendering controls at lower layers insufficient.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] IP security application in Internet layer
    Ruan Bingbing
    Lu Manli
    2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 410 - 415
  • [22] A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)
    Sudha, K. Swapna
    Jeyanthi, N.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (03) : 50 - 72
  • [23] Physical Layer Security for UAV Communications: A Comprehensive Survey
    Jue Wang
    Xuanxuan Wang
    Ruifeng Gao
    Chengleyang Lei
    Wei Feng
    Ning Ge
    Shi Jin
    Tony Q.S.Quek
    ChinaCommunications, 2022, 19 (09) : 77 - 115
  • [24] Physical Layer Security for UAV Communications: A Comprehensive Survey
    Wang, Jue
    Wang, Xuanxuan
    Gao, Ruifeng
    Lei, Chengleyang
    Feng, Wei
    Ge, Ning
    Jin, Shi
    Quek, Tony Q. S.
    CHINA COMMUNICATIONS, 2022, 19 (09) : 77 - 115
  • [25] Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives
    Himeur, Yassine
    Sohail, Shahab Saquib
    Bensaali, Faycal
    Amira, Abbes
    Alazab, Mamoun
    COMPUTERS & SECURITY, 2022, 118
  • [26] Recent Security Trends in Internet of Things: A Comprehensive Survey
    Harbi, Yasmine
    Aliouat, Zibouda
    Refoufi, Allaoua
    Harous, Saad
    IEEE ACCESS, 2021, 9 : 113292 - 113314
  • [27] Reliable Internet of Things: Challenges and Future Trends
    Khan, Mohammad Zubair
    Alhazmi, Omar H.
    Javed, Muhammad Awais
    Ghandorh, Hamza
    Aloufi, Khalid S.
    ELECTRONICS, 2021, 10 (19)
  • [28] Semantic Communications for Future Internet: Fundamentals, Applications, and Challenges
    Yang, Wanting
    Du, Hongyang
    Liew, Zi Qin
    Lim, Wei Yang Bryan
    Xiong, Zehui
    Niyato, Dusit
    Chi, Xuefen
    Shen, Xuemin
    Miao, Chunyan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 213 - 250
  • [29] Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review
    Oztoprak, Ahmet
    Hassanpour, Reza
    Ozkan, Aysegul
    Oztoprak, Kasim
    ACM COMPUTING SURVEYS, 2025, 57 (04)
  • [30] Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends
    Ukwandu, Elochukwu
    Ben-Farah, Mohamed Amine
    Hindy, Hanan
    Bures, Miroslav
    Atkinson, Robert
    Tachtatzis, Christos
    Andonovic, Ivan
    Bellekens, Xavier
    INFORMATION, 2022, 13 (03)