Identifying Research Trends and Gaps in the Context of Linux and Unix Security
Raquel C Adriano | Jahleine Marielle M. Calayag | Marian Minelli S. Cruz | Anthony U. Concepcion
Discipline: Education
Abstract:
Linux and Unix operating systems are fundamental to modern computing infrastructures, including cloud platforms, mobile devices, and supercomputers. With their increasing adoption, security has remained a persistent and evolving concern over the past two decades. This study conducts a systematic bibliometric analysis of 50 peer-reviewed journal articles and conference papers published between 2001 and 2020, segmented into four time periods: 2001–2005, 2006–2010, 2011–2015, and 2016–2020. Using citation analysis and co-word mapping via Mendeley and VOSviewer, the study identifies four main thematic clusters: (1) access control and authentication, (2) kernel-level vulnerabilities, (3) cloud and container security, and (4) mobile and Android-related threats. Early research focused on foundational topics such as system architecture and access control mechanisms, while more recent studies emphasized cloud-native security, virtualization, and mobile platform vulnerabilities. The analysis also reveals a significant disparity in research volume, with Linux-related studies dominating the field and Unix security receiving less than 20% of the total focus. This underrepresentation of Unix indicates a critical gap in the literature. These findings highlight not only the shifting priorities in open-source operating system security but also the need for renewed attention to Unix-specific threats and cross-platform security strategies in future research.
References:
- Alqurashi, F., & Ahmad, I. (2024). Scientomet-ric Analysis and Knowledge Mapping of Cybersecurity. International Journal of Advanced Computer Science and Applica-tions, 15(3), 1177–1184. https://doi.org/10.14569/IJACSA.2024.01503117
- Atenstaedt, Rob. 2012. “Word Cloud Analysis of the BJGP.” British Journal of General Practice 62(596):148. doi: 10.3399/bjgp12X630142.
- Baldwin, J., Alhawi, O. M. K., Shaughnessy, S., Akinbi, A., & Dehghantanha, A. (2018). Emerging from the cloud: A bibliometric analysis of cloud forensics studies. Ad-vances in Information Security, 70, 311–331. https://doi.org/10.1007/978-3-319-73951-9_16
- Bao, L., Yang, J., Yang, X., & Rong, C. (2025). Bibliometric Analysis of Scientific Publi-cations on Blockchain Research and Ap-plications. 0921, 0–3. http://arxiv.org/abs/2504.13387
- Bezerra, W. dos R., de Souza, C. A., Westphall, C. M., & Westphall, C. B. (2022). A Biblio-metrics Analysis on 28 years of Authenti-cation and Threat Model Area. Septem-ber. https://doi.org/10.48550/arXiv.2209.12985
- Brimhall, B., De La Garza, C., Garrard, J., & Coffman, J. (2023). A Comparative Analy-sis of Linux Mandatory Access Control Policy Enforcement Mechanisms. EU-ROSEC 2023 - Proceedings of the 2023 European Workshop on System Security, 1–7. https://doi.org/10.1145/3578357.3589454
- Cai, Xiang, Yuwei Gui, and Rob Johnson. 2009. “Exploiting Unix File-System Races via Algorithmic Complexity Attacks.” Proceedings - IEEE Symposium on Security and Privacy 27–41. doi: 10.1109/SP.2009.10.
- Chen, Xiuwen, Jianming Chen, Dengsheng Wu, Yongjia Xie, and Jing Li. 2016. “Mapping the Research Trends by Co-Word Analysis Based on Keywords from Funded Project.” Procedia Computer Science 91(Itqm):547–55. doi: 10.1016/j.procs.2016.07.140.
- Guo, Jinhong K., Stephen Johnson, David Braun, and Il Pyung Park. 2004. “Applicability of Low Water-Mark Mandatory Access Control Security in Linux-Based Advanced Networked Consumer Electronics.” IEEE Consumer Communications and Networking Conference, CCNC 364–69. doi: 10.1109/ccnc.2004.1286889.
- Ilić, L., Šijan, A., Predić, B., Viduka, D., & Karabašević, D. (2024). Research Trends in Artificial Intelligence and Security—Bibliometric Analysis. Electronics (Swit-zerland), 13(12). https://doi.org/10.3390/electronics13122288
- Kidwai, Abdullah, Chandrakala Arya, Prabhishek Singh, Manoj Diwakar, Shilpi Singh, Kanika Sharma, and Neeraj Kumar. 2020. “A Comparative Study on Shells in Linux: A Review.” Materials Today: Proceedings 37(Part 2):2612–16. doi: 10.1016/j.matpr.2020.08.508.
- Lin, X., Lei, L., Wang, Y., Jing, J., Sun, K., & Zhou, Q. (2018). A measurement study on linux container security: Attacks and countermeasures. ACM International Conference Proceeding Series, 418–429. https://doi.org/10.1145/3274694.3274720
- Ren, X., Rodrigues, K., Chen, L., Vega, C., Stumm, M., & Yuan, D. (2019). An analysis of performance evolution of Linux’s core operations. SOSP 2019 - Proceedings of the 27th ACM Symposium on Operating Systems Principles, 20, 554–569. https://doi.org/10.1145/3341301.3359640
- Salah, Khaled, Jose M. Alcaraz Calero, Jorge Bernal Bernabé, Juan M. Marín Perez, and Sherali Zeadally. 2013. “Analyzing the Security of Windows 7 and Linux for Cloud Computing.” Computers and Security 34:113–22. doi: 10.1016/j.cose.2012.12.001.
- Schmidt, Aubrey-derrick, Hans-Gunther Schmidt, Jan Clausen, Ahmet Camtepe, Sahin Albayrak, Kamer Ali Yüksel, and Osman Kiraz. 2008. “Enhancing Security of Linux-Based Android Devices.” 15th International Linux Kongress (August 2015).
- Staves, A., Gouglidis, A., & Hutchison, D. (2023). An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments. Digital Threats: Research and Practice, 4(1). https://doi.org/10.1145/3569958