Identifying Research Trends and Gaps in the Context of Linux and Unix Security
DOI:
https://doi.org/10.11594/ijmaber.06.06.14Keywords:
Linux security, Unix security, Operating system security, Cybersecurity trends, Bibliometric analysis, Access control, Authentication, Cloud security, Open-source security, Kernel vulnerabilitiesAbstract
Linux and Unix operating systems are fundamental to modern computing infrastructures, including cloud platforms, mobile devices, and supercomputers. With their increasing adoption, security has remained a persistent and evolving concern over the past two decades. This study conducts a systematic bibliometric analysis of 50 peer-reviewed journal articles and conference papers published between 2001 and 2020, segmented into four time periods: 2001–2005, 2006–2010, 2011–2015, and 2016–2020. Using citation analysis and co-word mapping via Mendeley and VOSviewer, the study identifies four main thematic clusters: (1) access control and authentication, (2) kernel-level vulnerabilities, (3) cloud and container security, and (4) mobile and Android-related threats. Early research focused on foundational topics such as system architecture and access control mechanisms, while more recent studies emphasized cloud-native security, virtualization, and mobile platform vulnerabilities. The analysis also reveals a significant disparity in research volume, with Linux-related studies dominating the field and Unix security receiving less than 20% of the total focus. This underrepresentation of Unix indicates a critical gap in the literature. These findings highlight not only the shifting priorities in open-source operating system security but also the need for renewed attention to Unix-specific threats and cross-platform security strategies in future research.
Downloads
References
Alqurashi, F., & Ahmad, I. (2024). Scientomet-ric Analysis and Knowledge Mapping of Cybersecurity. International Journal of Advanced Computer Science and Applica-tions, 15(3), 1177–1184. https://doi.org/10.14569/IJACSA.2024.01503117
Atenstaedt, Rob. 2012. “Word Cloud Analysis of the BJGP.” British Journal of General Practice 62(596):148. doi: 10.3399/bjgp12X630142.
Baldwin, J., Alhawi, O. M. K., Shaughnessy, S., Akinbi, A., & Dehghantanha, A. (2018). Emerging from the cloud: A bibliometric analysis of cloud forensics studies. Ad-vances in Information Security, 70, 311–331. https://doi.org/10.1007/978-3-319-73951-9_16
Bao, L., Yang, J., Yang, X., & Rong, C. (2025). Bibliometric Analysis of Scientific Publi-cations on Blockchain Research and Ap-plications. 0921, 0–3. http://arxiv.org/abs/2504.13387
Bezerra, W. dos R., de Souza, C. A., Westphall, C. M., & Westphall, C. B. (2022). A Biblio-metrics Analysis on 28 years of Authenti-cation and Threat Model Area. Septem-ber. https://doi.org/10.48550/arXiv.2209.12985
Brimhall, B., De La Garza, C., Garrard, J., & Coffman, J. (2023). A Comparative Analy-sis of Linux Mandatory Access Control Policy Enforcement Mechanisms. EU-ROSEC 2023 - Proceedings of the 2023 European Workshop on System Security, 1–7. https://doi.org/10.1145/3578357.3589454
Cai, Xiang, Yuwei Gui, and Rob Johnson. 2009. “Exploiting Unix File-System Races via Algorithmic Complexity Attacks.” Proceedings - IEEE Symposium on Security and Privacy 27–41. doi: 10.1109/SP.2009.10.
Chen, Xiuwen, Jianming Chen, Dengsheng Wu, Yongjia Xie, and Jing Li. 2016. “Mapping the Research Trends by Co-Word Analysis Based on Keywords from Funded Project.” Procedia Computer Science 91(Itqm):547–55. doi: 10.1016/j.procs.2016.07.140.
Guo, Jinhong K., Stephen Johnson, David Braun, and Il Pyung Park. 2004. “Applicability of Low Water-Mark Mandatory Access Control Security in Linux-Based Advanced Networked Consumer Electronics.” IEEE Consumer Communications and Networking Conference, CCNC 364–69. doi: 10.1109/ccnc.2004.1286889.
Ilić, L., Šijan, A., Predić, B., Viduka, D., & Karabašević, D. (2024). Research Trends in Artificial Intelligence and Security—Bibliometric Analysis. Electronics (Swit-zerland), 13(12). https://doi.org/10.3390/electronics13122288
Kidwai, Abdullah, Chandrakala Arya, Prabhishek Singh, Manoj Diwakar, Shilpi Singh, Kanika Sharma, and Neeraj Kumar. 2020. “A Comparative Study on Shells in Linux: A Review.” Materials Today: Proceedings 37(Part 2):2612–16. doi: 10.1016/j.matpr.2020.08.508.
Lin, X., Lei, L., Wang, Y., Jing, J., Sun, K., & Zhou, Q. (2018). A measurement study on linux container security: Attacks and countermeasures. ACM International Conference Proceeding Series, 418–429. https://doi.org/10.1145/3274694.3274720
Ren, X., Rodrigues, K., Chen, L., Vega, C., Stumm, M., & Yuan, D. (2019). An analysis of performance evolution of Linux’s core operations. SOSP 2019 - Proceedings of the 27th ACM Symposium on Operating Systems Principles, 20, 554–569. https://doi.org/10.1145/3341301.3359640
Salah, Khaled, Jose M. Alcaraz Calero, Jorge Bernal Bernabé, Juan M. Marín Perez, and Sherali Zeadally. 2013. “Analyzing the Security of Windows 7 and Linux for Cloud Computing.” Computers and Security 34:113–22. doi: 10.1016/j.cose.2012.12.001.
Schmidt, Aubrey-derrick, Hans-Gunther Schmidt, Jan Clausen, Ahmet Camtepe, Sahin Albayrak, Kamer Ali Yüksel, and Osman Kiraz. 2008. “Enhancing Security of Linux-Based Android Devices.” 15th International Linux Kongress (August 2015).
Staves, A., Gouglidis, A., & Hutchison, D. (2023). An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments. Digital Threats: Research and Practice, 4(1). https://doi.org/10.1145/3569958
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See the Effect of Open Access).