10,743 Hits in 3.9 sec

Protection of LAN-wide, P2P interactions: a holistic approach

Andre Zuquete
2009 International Journal of Communication Networks and Distributed Systems  
This article advocates the need of a holistic approach to protect LAN interactions and presents a solution for implementing it based on secure LAN (SLAN), a novel security architecture.  ...  We show how PPPoE and IPSec security associations may be instantiated and present a prototype implementation for IPSec. . His research interests include security in distributed systems.  ...  A prototype implementation was developed for Linux systems.  ... 
doi:10.1504/ijcnds.2009.027602 fatcat:knetznrnzjbgzmmrj6wsbicys4

ISP Offload Infrastructure to minimize cost and time deployment

Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui, Maryline Laurent
2012 2012 IEEE Global Communications Conference (GLOBECOM)  
Currently I-WLAN is the proposed offload architecture by 3GPP which tunnels the traffic to a Security Gateway.  ...  This paper proposes for ISPs an ISP Offload Infrastructure which minimizes the infrastructure cost deployment, and which can be deployed in a very short term.  ...  The remaining traffic that needs to be protected but that cannot be protected via End-to-End security is tunneled to a Security Gateway with the Offload Access Architecture OAA -cf. figure 1.  ... 
doi:10.1109/glocom.2012.6503250 dblp:conf/globecom/MigaultPHYGAL12 fatcat:ud5hpk45cbanritesnbgd4kbfa

Dynamic Isolation of Network Devices Using OpenFlow for Keeping LAN Secure from Intra-LAN Attack

Yutaka Juba, Hung-Hsuan Huang, Kyoji Kawagoe
2013 Procedia Computer Science  
In this paper, a novel network system architecture is proposed to protect network devices from intra-LAN attacks by dynamically isolating infected devices with OpenFlow.  ...  Preliminary evaluation results demonstrate that the architecture is effective in actual LAN environments.  ...  Acknowledgment The authors would like to thank reviewers for their valuable comments. This work was partly supported by JSPS KAKENHI Grant Number (24300039).  ... 
doi:10.1016/j.procs.2013.09.163 fatcat:w4pavmima5blxiaudcw3kq743m

LAN security: problems and solutions for Ethernet networks

Rinat Khoussainov, Ahmed Patel
2000 Computer Standards & Interfaces  
a prospective solution for building of secure encrypted Ethernet LANs.  ...  The architecture presented allows for employment of the existing office network infrastructure, does not require changes to workstations' software, and provides high level of protection.  ...  In this paper, we analysed the current situation with and existing architectures for LAN security and discussed why many traditional methods for protecting data in transfer, such as network or application  ... 
doi:10.1016/s0920-5489(00)00047-7 fatcat:qnanbn6qgzhunkhka3pricuzzu

The CRUTIAL Architecture for Critical Information Infrastructures [chapter]

Paulo Veríssimo, Nuno F. Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone
2008 Lecture Notes in Computer Science  
The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures.  ...  The chapter concludes with a discussion on Access Control for Critical Information Infrastructures, in Section 5. Architecture Description The CRUTIAL architecture encompasses four aspects.  ...  We warmly thank our partners at the project for many discussions on the topics of the chapter.  ... 
doi:10.1007/978-3-540-85571-2_1 fatcat:zym7eqqe4zb2fnm3vbrkeiaq5i


Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark, Mark Gondree
2009 Proceedings of the 2009 ACM workshop on Scalable trusted computing - STC '09  
networks, providing new capabilities for composing secure, distributed multilevel secure solutions.  ...  This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced.  ...  For exam- Figure 1: Monterey Security Architecture ple, an attempt could be made to use a non-TCBE equipped workstation attached to the LAN to modify or collect communications traffic.  ... 
doi:10.1145/1655108.1655115 dblp:conf/ccs/IrvineNSLKPCG09 fatcat:t7mnl7ltlbdrtdedcxlbepvhmy

Twelfth National Computer Security Conference - Baltimore, MD - October 10-13, 1989

E.B. Lennon
1990 Journal of Research of the National Institute of Standards and Technology  
Kirk Barker, Datotek, and Kimberly Kirkpatrick, MITRE, next described the Standard for Interoperable LAN Security (SILS) model which would provide a standard protocol for protecting LAN traffic; the IEEE  ...  for the Honeywell LOCK project; the formal specification of security aspects of a messaging system architecture; a Secure Distributed Operating System (SDOS) proto-type; a high B level security architecture  ... 
doi:10.6028/jres.095.023 pmid:28179774 pmcid:PMC4930047 fatcat:2nvckbuabrg2phfmx6s7lh6ezu

A Multi-agents System for Network Security Management [chapter]

K. Boudaoud, Zahia Guessoum
2000 Telecommunication Network Intelligence  
In this context, we propose a new approach for security management using intelligent agent (lA) technology.  ...  This approach provides a flexible integration of multiagent technique in a classical network to enhance its protection level against inherent attacks.  ...  So, applying security management is a two-fold activity: 1) the security architecture is to be deployed to protect networks by detecting attacks; and 2) when attacks are detected the security architecture  ... 
doi:10.1007/978-0-387-35522-1_23 dblp:conf/smartnet/BoudaoudG00 fatcat:3o7dpsawjvdrdmj2uvabtxtw24

Architecture for Real Time Monitoring and Modeling of Network Behavior for Enhanced Security

M. Ambika, R. V. Nataraj
2013 International Journal of Computer Applications  
Network security is a rapidly growing and is the major area of concern for every network.  ...  An IDS is a system where the events occurring in a network is monitored and analyzed for identifying the sign of possible incidents.  ...  Hence a separate security infrastructure is necessary for protecting the mobile agent.  ... 
doi:10.5120/10655-5421 fatcat:poswoycxv5ctraxedzxo6qv2dm

A Methodology for Network Security Infrastructure according to the New Brazilian General Law for Personal Data Protection

Luis Fellipe Castro Silva, Samyr B. Vale
2021 International Journal of Computer Applications  
Due to the lack of a reference methodology for implementing the protection requirements defined in the Law, this work proposes one that provides a basis for constructing the network architecture supported  ...  by the most common models and applying a security policy to computer network infrastructures.  ...  The DAM methodology provides a roadmap for data protection under the law.  ... 
doi:10.5120/ijca2021921520 fatcat:crhl4tep6ffizgck5ydbmr3nde

CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture [chapter]

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia
2006 Lecture Notes in Computer Science  
The paper focuses on the computer systems behind electrical utility infrastructures, and proposes the blueprint of a distributed systems architecture that we believe may come to be useful as a reference  ...  for modern critical information infrastructures in general.  ...  Acknowledgements CRUTIAL is a project of the IST programme of the European  ... 
doi:10.1007/11962977_1 fatcat:icn65da2qjhhbpujn5ekj4irti

The CRUTIAL reference critical information infrastructure architecture: a blueprint

Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia
2008 International Journal of System of Systems Engineering  
It proposes the blueprint of a distributed systems architecture that we believe may come to be useful as a reference for modern CII in general.  ...  ., Neves, N.F. and Correia, M. (2008) 'The CRUTIAL reference critical information infrastructure architecture: a blueprint', Int.  ...  Acknowledgements CRUTIAL is a project of the IST programme of the European Commission.  ... 
doi:10.1504/ijsse.2008.018132 fatcat:74mwshex5nhhpp5sloqoyo2wii

Networking Aspects in the DPASA Survivability Architecture: An Experience Report

M. Atighetchi, P. Rubel, P. Pal, J. Chong, L. Sudin
2005 Fourth IEEE International Symposium on Network Computing and Applications  
This paper focuses on the networking aspects of the DPASA 1 survivability architecture, which was used recently to defense-enable a DoD information system.  ...  Experience shows that implementing absolute security or preventing cyber attacks completely is infeasible when systems must be highly interconnected and comprise of COTS components with unknown security  ...  F30602-02-C-0134. 1 DPASA stands for Designing Protection and Adaptation into a Survivability Architecture. architecture introduces multiple mechanisms (representing both COTS and research grade technologies  ... 
doi:10.1109/nca.2005.35 dblp:conf/nca/AtighetchiRPCS05 fatcat:pfo6n3snrzh3vfsem5ok67v22a

A computational asset vulnerability model for the strategic protection of the critical infrastructure

Richard White, Terrance Boult, Edward Chow
2014 International Journal of Critical Infrastructure Protection  
courseware on modern OS Security for CMU Software Engineering Institute, through a $19,349 grant from JMark Services, 2/13-5/24/2013.  ...  The system provides a graphical interface to facilitate the application of these methods and creates an interactive environment for specifying, verifying and designing communication protocols.  ... 
doi:10.1016/j.ijcip.2014.06.002 fatcat:wupejmictrfthp22jzeknitwxu

Secure Client Puzzles Based on Random Beacons [chapter]

Yves Igor Jerschow, Martin Mauve
2012 Lecture Notes in Computer Science  
In this paper we introduce a secure client puzzle architecture that overcomes the described authentication issue.  ...  A well-known countermeasure against resource depletion attacks are client puzzles. Most existing client puzzle schemes are interactive.  ...  Protocol Extensions Beacon Distribution across LAN Boundaries Our secure client puzzle architecture primarily focuses on LANs where counterattacks on interactive client puzzle protocols through injection  ... 
doi:10.1007/978-3-642-30054-7_15 fatcat:uh3ypnbx5ncy3e4qmnwhz3e4x4
« Previous Showing results 1 — 15 out of 10,743 results