Identifying Research Trends and Gaps in the Context of Linux and Unix Security

Authors

  • Raquel C. Adriano College of Information and Communications Technology, Bulacan State University, 3000 City of Malolos, Bulacan, Philippines
  • Jahleine Marielle M. Calayag College of Information and Communications Technology, Bulacan State University, 3000 City of Malolos, Bulacan, Philippines
  • Marian Minelli S. Cruz College of Information and Communications Technology, Bulacan State University, 3000 City of Malolos, Bulacan, Philippines
  • Anthony U. Concepcion Bulacan State University – Bustos Campus, 3000 City of Malolos, Bulacan, Philippines

DOI:

https://doi.org/10.11594/ijmaber.06.06.14

Keywords:

Linux security, Unix security, Operating system security, Cybersecurity trends, Bibliometric analysis, Access control, Authentication, Cloud security, Open-source security, Kernel vulnerabilities

Abstract

Linux and Unix operating systems are fundamental to modern computing infrastructures, including cloud platforms, mobile devices, and supercomputers. With their increasing adoption, security has remained a persistent and evolving concern over the past two decades. This study conducts a systematic bibliometric analysis of 50 peer-reviewed journal articles and conference papers published between 2001 and 2020, segmented into four time periods: 2001–2005, 2006–2010, 2011–2015, and 2016–2020. Using citation analysis and co-word mapping via Mendeley and VOSviewer, the study identifies four main thematic clusters: (1) access control and authentication, (2) kernel-level vulnerabilities, (3) cloud and container security, and (4) mobile and Android-related threats. Early research focused on foundational topics such as system architecture and access control mechanisms, while more recent studies emphasized cloud-native security, virtualization, and mobile platform vulnerabilities. The analysis also reveals a significant disparity in research volume, with Linux-related studies dominating the field and Unix security receiving less than 20% of the total focus. This underrepresentation of Unix indicates a critical gap in the literature. These findings highlight not only the shifting priorities in open-source operating system security but also the need for renewed attention to Unix-specific threats and cross-platform security strategies in future research.

Downloads

Download data is not yet available.

References

Alqurashi, F., & Ahmad, I. (2024). Scientomet-ric Analysis and Knowledge Mapping of Cybersecurity. International Journal of Advanced Computer Science and Applica-tions, 15(3), 1177–1184. https://doi.org/10.14569/IJACSA.2024.01503117

Atenstaedt, Rob. 2012. “Word Cloud Analysis of the BJGP.” British Journal of General Practice 62(596):148. doi: 10.3399/bjgp12X630142.

Baldwin, J., Alhawi, O. M. K., Shaughnessy, S., Akinbi, A., & Dehghantanha, A. (2018). Emerging from the cloud: A bibliometric analysis of cloud forensics studies. Ad-vances in Information Security, 70, 311–331. https://doi.org/10.1007/978-3-319-73951-9_16

Bao, L., Yang, J., Yang, X., & Rong, C. (2025). Bibliometric Analysis of Scientific Publi-cations on Blockchain Research and Ap-plications. 0921, 0–3. http://arxiv.org/abs/2504.13387

Bezerra, W. dos R., de Souza, C. A., Westphall, C. M., & Westphall, C. B. (2022). A Biblio-metrics Analysis on 28 years of Authenti-cation and Threat Model Area. Septem-ber. https://doi.org/10.48550/arXiv.2209.12985

Brimhall, B., De La Garza, C., Garrard, J., & Coffman, J. (2023). A Comparative Analy-sis of Linux Mandatory Access Control Policy Enforcement Mechanisms. EU-ROSEC 2023 - Proceedings of the 2023 European Workshop on System Security, 1–7. https://doi.org/10.1145/3578357.3589454

Cai, Xiang, Yuwei Gui, and Rob Johnson. 2009. “Exploiting Unix File-System Races via Algorithmic Complexity Attacks.” Proceedings - IEEE Symposium on Security and Privacy 27–41. doi: 10.1109/SP.2009.10.

Chen, Xiuwen, Jianming Chen, Dengsheng Wu, Yongjia Xie, and Jing Li. 2016. “Mapping the Research Trends by Co-Word Analysis Based on Keywords from Funded Project.” Procedia Computer Science 91(Itqm):547–55. doi: 10.1016/j.procs.2016.07.140.

Guo, Jinhong K., Stephen Johnson, David Braun, and Il Pyung Park. 2004. “Applicability of Low Water-Mark Mandatory Access Control Security in Linux-Based Advanced Networked Consumer Electronics.” IEEE Consumer Communications and Networking Conference, CCNC 364–69. doi: 10.1109/ccnc.2004.1286889.

Ilić, L., Šijan, A., Predić, B., Viduka, D., & Karabašević, D. (2024). Research Trends in Artificial Intelligence and Security—Bibliometric Analysis. Electronics (Swit-zerland), 13(12). https://doi.org/10.3390/electronics13122288

Kidwai, Abdullah, Chandrakala Arya, Prabhishek Singh, Manoj Diwakar, Shilpi Singh, Kanika Sharma, and Neeraj Kumar. 2020. “A Comparative Study on Shells in Linux: A Review.” Materials Today: Proceedings 37(Part 2):2612–16. doi: 10.1016/j.matpr.2020.08.508.

Lin, X., Lei, L., Wang, Y., Jing, J., Sun, K., & Zhou, Q. (2018). A measurement study on linux container security: Attacks and countermeasures. ACM International Conference Proceeding Series, 418–429. https://doi.org/10.1145/3274694.3274720

Ren, X., Rodrigues, K., Chen, L., Vega, C., Stumm, M., & Yuan, D. (2019). An analysis of performance evolution of Linux’s core operations. SOSP 2019 - Proceedings of the 27th ACM Symposium on Operating Systems Principles, 20, 554–569. https://doi.org/10.1145/3341301.3359640

Salah, Khaled, Jose M. Alcaraz Calero, Jorge Bernal Bernabé, Juan M. Marín Perez, and Sherali Zeadally. 2013. “Analyzing the Security of Windows 7 and Linux for Cloud Computing.” Computers and Security 34:113–22. doi: 10.1016/j.cose.2012.12.001.

Schmidt, Aubrey-derrick, Hans-Gunther Schmidt, Jan Clausen, Ahmet Camtepe, Sahin Albayrak, Kamer Ali Yüksel, and Osman Kiraz. 2008. “Enhancing Security of Linux-Based Android Devices.” 15th International Linux Kongress (August 2015).

Staves, A., Gouglidis, A., & Hutchison, D. (2023). An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments. Digital Threats: Research and Practice, 4(1). https://doi.org/10.1145/3569958

Downloads

Published

2025-06-23

How to Cite

Adriano, R. C. ., Calayag, J. M. M. ., Cruz, M. M. S. ., & Concepcion, A. U. (2025). Identifying Research Trends and Gaps in the Context of Linux and Unix Security. International Journal of Multidisciplinary: Applied Business and Education Research, 6(6), 2822-2835. https://doi.org/10.11594/ijmaber.06.06.14