scholarly journals Analysis of Policy Anomalies on Distributed Network Security Setups

Author(s):  
J. G. Alfaro ◽  
F. Cuppens ◽  
N. Cuppens-Boulahia
2015 ◽  
Vol 116 (23) ◽  
pp. 7-13 ◽  
Author(s):  
Ameya Hanamsagar ◽  
Bhagyashree Borate ◽  
Ninad Jane ◽  
Aditi Wasvand ◽  
Santosh Darade

2020 ◽  
Vol 20 ◽  
pp. 95-108
Author(s):  
Zhiyong Shan ◽  
Vinod Namboodiri

In recent years, the emerged network worms and attacks have distributive characteristics, which can spread globally in a short time. Security management crossing network to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. This paper proposes a hierarchical distributed network security management system (HD-NSMS), which can centrally manage security across networks. First describes the system in macrostructure and microstructure; then discusses three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; at last, it describes the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).


Optik ◽  
2010 ◽  
Vol 121 (23) ◽  
pp. 2137-2139 ◽  
Author(s):  
P. Pongwongtragull ◽  
S. Mitatha ◽  
P.P. Yupapin

2005 ◽  
Vol 13 (3) ◽  
pp. 329-344 ◽  
Author(s):  
Gavin W. Manes ◽  
Dominic Schulte ◽  
Seth Guenther ◽  
Sujeet Shenoi

2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Ying-Chiang Cho ◽  
Jen-Yi Pan

With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network’s existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter’s inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.


Author(s):  
Simon Adameit ◽  
Tobias Betz ◽  
Lawrence Cabac ◽  
Florian Hars ◽  
Marcin Hewelt ◽  
...  

Author(s):  
Songchang Jin ◽  
Songhe Jin ◽  
Shuqiang Yang ◽  
Xiang Zhu

Sign in / Sign up

Export Citation Format

Share Document