Comparative Analysis of Network Segmentation Strategies to Counter Targeted Attacks in Global E-Commerce Cloud Infrastructures

Authors

  • Eko Santoso Bangka Belitung Technological Institute, Department of Computer Science, Tin Mine Avenue, Pangkalpinang, Indonesia. Author

Abstract

Network segmentation remains a pivotal defense strategy for global e-commerce platforms operating within complex cloud infrastructures. Targeted attacks exploit the interconnected nature of distributed services, seeking to move laterally through microservices and data repositories to reach sensitive assets. By subdividing networks into security zones tailored to functional roles and risk profiles, administrators reduce the blast radius of successful penetrations and better enforce the principle of least privilege. This comparative analysis examines various segmentation methodologies, including traditional VLAN-based partitioning, software-defined networking (SDN), micro-segmentation at the workload level, and zero-trust implementations that integrate identity and context checks. Each approach is evaluated according to its complexity, scalability, and suitability for dynamic cloud environments. E-commerce platforms face additional challenges due to high-volume transactional traffic, continuous integration cycles, and cross-region deployments, all of which complicate the maintenance of segmented zones. Findings highlight that rigorous policy governance, real-time monitoring, and standardized frameworks for defining trust boundaries are indispensable for achieving resilient segmentation. Concluding observations underscore the necessity of adopting holistic, adaptive strategies that integrate segmentation with access control and continuous risk assessment to effectively counter the evolving landscape of targeted attacks.

Downloads

Published

2022-12-04

How to Cite

Comparative Analysis of Network Segmentation Strategies to Counter Targeted Attacks in Global E-Commerce Cloud Infrastructures. (2022). Journal of Advances in Cybersecurity Science, Threat Intelligence, and Countermeasures, 6(12), 1-6. https://polarpublications.com/index.php/JACSTIC/article/view/2022-12-04