ºÚÁϳԹÏÍø

HomeInternational Journal of Multidisciplinary: Applied Business and Education Researchvol. 6 no. 6 (2025)

Identifying Research Trends and Gaps in the Context of Linux and Unix Security

Raquel C Adriano | Jahleine Marielle M. Calayag | Marian Minelli S. Cruz | Anthony U. Concepcion

Discipline: Education

 

Abstract:

Linux and Unix operating systems are fundamental to modern computing infrastructures, including cloud platforms, mobile devices, and supercomputers. With their increasing adoption, security has remained a persistent and evolving concern over the past two decades. This study conducts a systematic bibliometric analysis of 50 peer-reviewed journal articles and conference papers published between 2001 and 2020, segmented into four time periods: 2001–2005, 2006–2010, 2011–2015, and 2016–2020. Using citation analysis and co-word mapping via Mendeley and VOSviewer, the study identifies four main thematic clusters: (1) access control and authentication, (2) kernel-level vulnerabilities, (3) cloud and container security, and (4) mobile and Android-related threats. Early research focused on foundational topics such as system architecture and access control mechanisms, while more recent studies emphasized cloud-native security, virtualization, and mobile platform vulnerabilities. The analysis also reveals a significant disparity in research volume, with Linux-related studies dominating the field and Unix security receiving less than 20% of the total focus. This underrepresentation of Unix indicates a critical gap in the literature. These findings highlight not only the shifting priorities in open-source operating system security but also the need for renewed attention to Unix-specific threats and cross-platform security strategies in future research.



References:

  1. Alqurashi, F., & Ahmad, I. (2024). Scientomet-ric Analysis and Knowledge Mapping of Cybersecurity. International Journal of Advanced Computer Science and Applica-tions, 15(3), 1177–1184. 
  2. Atenstaedt, Rob. 2012. “Word Cloud Analysis of the BJGP.” British Journal of General Practice 62(596):148. doi: 10.3399/bjgp12X630142.
  3. Baldwin, J., Alhawi, O. M. K., Shaughnessy, S., Akinbi, A., & Dehghantanha, A. (2018). Emerging from the cloud: A bibliometric analysis of cloud forensics studies. Ad-vances in Information Security, 70, 311–331. 
  4. Bao, L., Yang, J., Yang, X., & Rong, C. (2025). Bibliometric Analysis of Scientific Publi-cations on Blockchain Research and Ap-plications. 0921, 0–3. 
  5. Bezerra, W. dos R., de Souza, C. A., Westphall, C. M., & Westphall, C. B. (2022). A Biblio-metrics Analysis on 28 years of Authenti-cation and Threat Model Area. Septem-ber. 
  6. Brimhall, B., De La Garza, C., Garrard, J., & Coffman, J. (2023). A Comparative Analy-sis of Linux Mandatory Access Control Policy Enforcement Mechanisms. EU-ROSEC 2023 - Proceedings of the 2023 European Workshop on System Security, 1–7. 
  7. Cai, Xiang, Yuwei Gui, and Rob Johnson. 2009. “Exploiting Unix File-System Races via Algorithmic Complexity Attacks.” Proceedings - IEEE Symposium on Security and Privacy 27–41. doi: 10.1109/SP.2009.10.
  8. Chen, Xiuwen, Jianming Chen, Dengsheng Wu, Yongjia Xie, and Jing Li. 2016. “Mapping the Research Trends by Co-Word Analysis Based on Keywords from Funded Project.” Procedia Computer Science 91(Itqm):547–55. doi: 10.1016/j.procs.2016.07.140.
  9. Guo, Jinhong K., Stephen Johnson, David Braun, and Il Pyung Park. 2004. “Applicability of Low Water-Mark Mandatory Access Control Security in Linux-Based Advanced Networked Consumer Electronics.” IEEE Consumer Communications and Networking Conference, CCNC 364–69. doi: 10.1109/ccnc.2004.1286889.
  10. Ilić, L., Šijan, A., Predić, B., Viduka, D., & Karabašević, D. (2024). Research Trends in Artificial Intelligence and Security—Bibliometric Analysis. Electronics (Swit-zerland), 13(12). 
  11. Kidwai, Abdullah, Chandrakala Arya, Prabhishek Singh, Manoj Diwakar, Shilpi Singh, Kanika Sharma, and Neeraj Kumar. 2020. “A Comparative Study on Shells in Linux: A Review.” Materials Today: Proceedings 37(Part 2):2612–16. doi: 10.1016/j.matpr.2020.08.508.
  12. Lin, X., Lei, L., Wang, Y., Jing, J., Sun, K., & Zhou, Q. (2018). A measurement study on linux container security: Attacks and countermeasures. ACM International Conference Proceeding Series, 418–429. 
  13. Ren, X., Rodrigues, K., Chen, L., Vega, C., Stumm, M., & Yuan, D. (2019). An analysis of performance evolution of Linux’s core operations. SOSP 2019 - Proceedings of the 27th ACM Symposium on Operating Systems Principles, 20, 554–569. 
  14. Salah, Khaled, Jose M. Alcaraz Calero, Jorge Bernal Bernabé, Juan M. Marín Perez, and Sherali Zeadally. 2013. “Analyzing the Security of Windows 7 and Linux for Cloud Computing.” Computers and Security 34:113–22. doi: 10.1016/j.cose.2012.12.001.
  15. Schmidt, Aubrey-derrick, Hans-Gunther Schmidt, Jan Clausen, Ahmet Camtepe, Sahin Albayrak, Kamer Ali Yüksel, and Osman Kiraz. 2008. “Enhancing Security of Linux-Based Android Devices.” 15th International Linux Kongress (August 2015).
  16. Staves, A., Gouglidis, A., & Hutchison, D. (2023). An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments. Digital Threats: Research and Practice, 4(1).