Design and Application of a Network Security Model

2013 ◽  
Vol 347-350 ◽  
pp. 2773-2776
Author(s):  
Shi Ping Xu ◽  
Yu Han Zhang ◽  
Ying Zhou ◽  
Yong Qiang Bai ◽  
Hai Peng Fu

This paper analyzes the deficiency of P2DR security model, and proposes a kind of new active dynamic security model AD-RPPDRRM, in which risk analysis, management and recovery are imported. On the basis of this model, basic technologies used to implement the defense in depth system are discussed. At last, a defense in-depth system of a typical network is given.

2018 ◽  
Vol 7 (4) ◽  
pp. 593-600
Author(s):  
M. A. Naagas ◽  
E. L. Mique Jr ◽  
T. D. Palaoag ◽  
J. S. Dela Cruz

Denial of Service (DOS) and (DDOS) Distributed Denial of Service attacks have become a major security threat to university campus network security since most of the students and teachers prepare online services such as enrolment, grading system, library etc. Therefore, the issue of network security has become a priority to university campus network management. Using online services in university network can be easily compromised. However, traditional security mechanisms approach such as Defense-In-Depth (DID) Model is outdated in today’s complex network and DID Model has been used as a primary cybersecurity defense model in the university campus network today. However, university administration should realize that Defense-In-Depth (DID) are playing an increasingly limited role in DOS/DDoS protection and this paper brings this fact to light. This paper presents that the Defense-In-Depth (DID) is not capable of defending complex and volatile DOS/DDOS attacks effectively. The test results were presented in this study in order to support our claim. The researchers established a Defense-In-Depth (DID) Network model at the Central Luzon State University and penetrated the Network System using DOS/DDOS attack to simulate the real network scenario. This paper also presents the new approach Defense-through-Deception network security model that improves the traditional passive protection by applying deception techniques to them that give insights into the limitations posed by the Defense-In-Depth (DID) Model. Furthermore, this model is designed to prevent an attacker who has already entered the network from doing damage.


Author(s):  
Chanintorn Jittawiriyanukoon

<span>To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentricity, clustering coefficient and cliques. Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG. The probability of an individual attack edge and associated network nodes are computed in order to quantify the security threat. The simulation is exploited to validate that results are effective.</span>


1993 ◽  
Vol 12 (2) ◽  
pp. 169-189 ◽  
Author(s):  
John A. Fitch ◽  
Lance J. Hoffman

Author(s):  
Rajesh Kumar Meena ◽  
Harnidh Kaur ◽  
Kirti Sharma ◽  
Simran Kaur ◽  
Smriti Sharma

Sign in / Sign up

Export Citation Format

Share Document