Network Security and Risk Technologies

[{“box”:0,”content”:”n[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n[if 2704 equals=”Yes”]n

n

Notice

nThis is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.n

n[/if 2704]n

n

Year : 2025 [if 2224 equals=””]24/09/2025 at 3:57 PM[/if 2224] | [if 1553 equals=””] Volume : 13 [else] Volume : 13[/if 1553] | [if 424 equals=”Regular Issue”]Issue : [/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 03 | Page : 26 34

n

n

nn

n

n

n

    By

    n

    [foreach 286]n

    n

    Muskan Sharma, Krati Sharma, Khushi Sharma, Navya Khandelwal,

    n t

  • n

    n[/foreach]

    n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Associate Professor, Student, Student, Department of Computer Science and Engineering, Poornima Institute of Engineering and Technology, Jaipur, Department of English and Soft Skills, Poornima Institute of Engineering and Technology, Jaipur, Department of Computer Science and Engineering, Poornima Institute of Engineering and Technology, Jaipur, Department of Computer Science and Engineering, Poornima Institute of Engineering and Technology, Jaipur, Rajasthan, Rajasthan, Rajasthan, Rajasthan, India, India, India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

n

n

nThis research work delves into the dynamic domain of network security risk, providing a comprehensive analysis of corruption of data. The study explores strategic models aimed at strengthening network defenses in response to the continually changing threat environment. In the past, network security has relied on various technologies to mitigate risks, which include Firewalls, Virtual Private Networks (VPNs) and Encryption Protocols. The research scrutinizes the role of technologies such as homomorphic encryption for safeguarding data privacy and the emergence of Extended Detection and Response (XDR) platforms for holistic threat management. Automation, self-healing networks, and advancements in biometric authentication methods are also discussed as integral components of a resilient security infrastructure. Future of network security risk technologies are growing rapidly and are witnessing advancement in technologies which include AI-Powered Threat Intelligence, 5G Security, Enhanced extended detection Response (XDR), Biometric Authentication Advances and Self-Healing Networks.nn

n

n

n

Keywords: Data, AI, XDR, management, IoT

n[if 424 equals=”Regular Issue”][This article belongs to Journal Of Network security ]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal Of Network security (jons)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article:
nMuskan Sharma, Krati Sharma, Khushi Sharma, Navya Khandelwal. [if 2584 equals=”][226 wpautop=0 striphtml=1][else]Network Security and Risk Technologies[/if 2584]. Journal Of Network security. 17/09/2025; 13(03):26-34.

n

How to cite this URL:
nMuskan Sharma, Krati Sharma, Khushi Sharma, Navya Khandelwal. [if 2584 equals=”][226 striphtml=1][else]Network Security and Risk Technologies[/if 2584]. Journal Of Network security. 17/09/2025; 13(03):26-34. Available from: https://journals.stmjournals.com/jons/article=17/09/2025/view=0

nn

n

n[if 992 equals=”Open Access”]Full Text PDF[/if 992]n

n

n[if 992 not_equal=”Open Access”]n

n

n[/if 992]n

nn

nnn

n[if 379 not_equal=””]nn

Browse Figures

n

n

n[foreach 379]

figures

[/foreach]n

n

n

n[/if 379]

n

n

n

n

n

References n

n[if 1104 equals=””]n

  1. Kartalopoulos SV. Differentiating data security and network security. In 2008 IEEE International Conference on Communications. 2008 May 19; 1469–1473.
  2. Sotillo S. Ipv6 security issues. Scanning. 2006; 4: 1–6.
  3. Farrow R. Securing the Web: fire walls, proxy servers, and data driven attacks. InfoWorld. 1995 Jun 19; 17(25): 103–4.
  4. Flauzac O, Nolot F, Rabat C, Steffenel LA. Grid of security: A new approach of the network security. In 2009 IEEE Third International Conference on Network and System Security. 2009 Oct 19; 67–72.
  5. Florea R, Craus M. A game-theoretic approach for network security using honeypots. Future Internet. 2022 Nov 30; 14(12): 362.
  6. Barker K. The security implications of IPv6. Netw Secur. 2013 Jun 1; 2013(6): 5–9.
  7. Sabillon R, Cavaller V, Cano J. National cyber security strategies: global trends in cyberspace. International Journal of Computer Science and Software Engineering (IJCSSE). 2016 May 1; 5(5): 67–81.
  8. Vargas H, Lozano-Garzon C, Montoya GA, Donoso Y. Detection of security attacks in industrial IoT networks: A blockchain and machine learning approach. Electronics. 2021 Oct 30; 10(21): 2662.
  9. Hyder MF, Farooq MU, Ahmed U, Raza W. Towards enhancing the endpoint security using moving target defense (shuffle-based approach) in software defined networking. Eng Technol Appl Sci Res. 2021 Aug 21; 11(4): 7483–8.
  10. Javanmardi S, Shojafar M, Mohammadi R, Nazari A, Persico V, Pescape A. FUPE: A security driven task scheduling approach for SDN-based IoT–Fog networks. J Inf Secur Appl. 2021 Aug 1; 60: 102853.
  11. Liu Y. Computer Network Information Security in the Big Data Era. In: The International Conference on Cyber Security Intelligence and Analytics. Cham: Springer International Publishing; 2020 Feb 28; 153–160.
  12. Olakanmi OO, Odeyemi KO. Versa: Verifiable and secure approach with provable security for fine-grained data distribution in scalable Internet of things networks. Int J Inf Secur Priv. 2021 Jul 1; 15(3): 65–82.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal Of Network security

n

[if 344 not_equal=””]ISSN: 2395-6739[/if 344]

n

n

n

nn

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n[if 1746 equals=”Retracted”]n

n

n

n

[/if 1746]n[if 4734 not_equal=””]

n

n

n

[/if 4734]n

n

Volume 13
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 03
Received 12/05/2025
Accepted 21/08/2025
Published 17/09/2025
Retracted
Publication Time 128 Days

n

n

nn


n

Login

n
My IP
n

PlumX Metrics

nn

n

n

n[if 1746 equals=”Retracted”]n

[/if 1746]nnn

nnn”}]