Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network Testing

Author(s):  
Sultan Alasmari ◽  
Weichao Wang ◽  
Yu Wang
2006 ◽  
Vol 153 (2) ◽  
pp. 43 ◽  
Author(s):  
Z. Hayat ◽  
J. Reeve ◽  
C. Boutle

Author(s):  
Manuel Mogollon

In previous chapters of this book, crypto systems, security mechanisms, and security services have been discussed and reviewed as separate crypto modules. In Chapters 10 to 14, how these crypto modules are used to provide network security will be discussed. Electronic mail enables users to exchange messages using computer communications facilities, but sending an e-mail message is like sending a postcard that anyone can read as it travels from post office to post office. When an e-mail message travels from one e-mail server to another, the e-mail is first stored in an e-mail server before it is sent to the next e-mail server. A way to protect e-mail is by using writer-to-reader security in which the message is encrypted at the sender station and deciphered at the receiver station. There are several ways to make e-mail secure. Pretty Good Privacy (PGP) and Secure MIME (S/MIME) are presented in this chapter.


2017 ◽  
Vol 73 (7) ◽  
pp. 3307-3325 ◽  
Author(s):  
Jong Hyuk Park ◽  
Yunsick Sung ◽  
Pradip Kumar Sharma ◽  
Young-Sik Jeong ◽  
Gangman Yi

2018 ◽  
Vol 7 (2) ◽  
pp. 86-90
Author(s):  
D. Selvamani ◽  
V. Selvi

Security is very important90 for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This paper presents a double way authentication mechanism which uses the functionality of Elliptical Curve Cryptography, Kerberos System and RSA algorithm. ECC algorithm utilized to encrypt the user information whereas RSA used to encrypt the secret key itself to ensure the more security in the networks.


In spite of all the advantages while using networks in any form, there are large numbers of possible security issues that are rising with networking. To sort the security issues network security is the action that is intended to safe guard the resources and integrity of network and data. At work stations there are filters, firewall to protect. But while data in transmission security services are needed and frequent change in methods are to be developed to counter threats. In this work different methods like pseudorandom generation and multiple genetic algorithms are used that resembles quite different in nature. This proposed hybrid algorithm can be used in small business applications where they are frequently hacked. Small organizations that cannot afford to build a strong security system can use such hybrid systems.


2018 ◽  
Vol 3 (1) ◽  
Author(s):  
Baihaqi . ◽  
Yeni Yanti ◽  
Zulfan .

Nowadays the use of WiFi network technology device has been widely developed around the world, both used for voice and data communications. WiFi networks utilize high frequencies to deliver and connect a communication, then the vulnerability to security is also higher than with other communication technologies. Various security measures can be done through communication devices used by users or by operators who provide communication services. However, with the user who utilizes WiFi network technology, it can provide little security hole that can be exploited by the attacker. Then the attacker can find out the WPA2-PSK security password when the user connects to the WiFi network. So the resulting password through several techniques and testing used. Among them by utilizing the user connected to the WiFi network, testing fake SSID and testing WPS PIN. However, in this study only conducted testing through a user connected to a WiFi network. This technique and testing is solely done to penetrate the security of WiFi network, which aims to know the password of WPA2-PSK on WiFi network and to add insight about WiFi network security


Author(s):  
Jinyong Kim ◽  
Mahdi Daghmehchi Firoozjaei ◽  
Jaehoon Paul Jeong ◽  
Hyoungshick Kim ◽  
Jung-Soo Park

Sign in / Sign up

Export Citation Format

Share Document