SDN-based security services using interface to network security functions

Author(s):  
Jinyong Kim ◽  
Mahdi Daghmehchi Firoozjaei ◽  
Jaehoon Paul Jeong ◽  
Hyoungshick Kim ◽  
Jung-Soo Park
2006 ◽  
Vol 153 (2) ◽  
pp. 43 ◽  
Author(s):  
Z. Hayat ◽  
J. Reeve ◽  
C. Boutle

Author(s):  
Manuel Mogollon

In previous chapters of this book, crypto systems, security mechanisms, and security services have been discussed and reviewed as separate crypto modules. In Chapters 10 to 14, how these crypto modules are used to provide network security will be discussed. Electronic mail enables users to exchange messages using computer communications facilities, but sending an e-mail message is like sending a postcard that anyone can read as it travels from post office to post office. When an e-mail message travels from one e-mail server to another, the e-mail is first stored in an e-mail server before it is sent to the next e-mail server. A way to protect e-mail is by using writer-to-reader security in which the message is encrypted at the sender station and deciphered at the receiver station. There are several ways to make e-mail secure. Pretty Good Privacy (PGP) and Secure MIME (S/MIME) are presented in this chapter.


2017 ◽  
Vol 73 (7) ◽  
pp. 3307-3325 ◽  
Author(s):  
Jong Hyuk Park ◽  
Yunsick Sung ◽  
Pradip Kumar Sharma ◽  
Young-Sik Jeong ◽  
Gangman Yi

2018 ◽  
Vol 7 (2) ◽  
pp. 86-90
Author(s):  
D. Selvamani ◽  
V. Selvi

Security is very important90 for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This paper presents a double way authentication mechanism which uses the functionality of Elliptical Curve Cryptography, Kerberos System and RSA algorithm. ECC algorithm utilized to encrypt the user information whereas RSA used to encrypt the secret key itself to ensure the more security in the networks.


In spite of all the advantages while using networks in any form, there are large numbers of possible security issues that are rising with networking. To sort the security issues network security is the action that is intended to safe guard the resources and integrity of network and data. At work stations there are filters, firewall to protect. But while data in transmission security services are needed and frequent change in methods are to be developed to counter threats. In this work different methods like pseudorandom generation and multiple genetic algorithms are used that resembles quite different in nature. This proposed hybrid algorithm can be used in small business applications where they are frequently hacked. Small organizations that cannot afford to build a strong security system can use such hybrid systems.


2018 ◽  
Vol 56 (1) ◽  
pp. 171-178 ◽  
Author(s):  
Sangwon Hyun ◽  
Jinyong Kim ◽  
Hyoungshick Kim ◽  
Jaehoon Jeong ◽  
Susan Hares ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document