Unifying the conceptual levels of network security through the use of patterns.Reportar como inadecuado

 Unifying the conceptual levels of network security through the use of patterns.

Unifying the conceptual levels of network security through the use of patterns. - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Type of Resource: text

Genre: Electronic Thesis or Dissertation

Issuance: single unit

Date Created: Spring 2014

Date Issued: 2014

Publisher: Florida Atlantic University

Physical Form: Online Resource

Extent: 151 p.

Language(s): English

Summary: Network architectures are described by the International Standard forOrganization (ISO), which contains seven layers. The internet uses four of these layers,of which three are of interest to us. These layers are Internet Protocol (IP) or NetworkLayer, Transport Layer and Application Layer. We need to protect against attacks thatmay come through any of these layers. In the world of network security, systems are plagued by various attacks, internal and external, and could result in Denial of Service (DoS) and/or other damaging effects. Such attacks and loss of service can be devastating for the users of the system. The implementation of security devices such as Firewalls and Intrusion Detection Systems(IDS), the protection of network traffic with Virtual Private Networks (VPNs), and theuse of secure protocols for the layers are important to enhance the security at each ofthese layers.We have done a survey of the existing network security patterns and we have written the missing patterns. We have developed security patterns for abstract IDS, Behavior–based IDS and Rule-based IDS and as well as for Internet Protocol Security (IPSec) and Transport Layer Security (TLS) protocols. We have also identified the need for a VPN pattern and have developed security patterns for abstract VPN, an IPSec VPN and a TLS VPN. We also evaluated these patterns with respect to some aspects to simplify their application by system designers. We have tried to unify the security of the network layers using security patterns by tying in security patterns for network transmission, network protocols and network boundary devices.

Identifier: FA00004132 (IID)

Note(s): Includes bibliography.Dissertation (Ph.D.)--Florida Atlantic University, 2014.

Subject(s): Computer architectureComputer network architecturesComputer network protocolsComputer networks -- Security measuresExpert systems (Computer science)

Held by: Florida Atlantic University Digital Library

Sublocation: Boca Raton, Fla.

Persistent Link to This Record: http://purl.flvc.org/fau/fd/FA00004132

Restrictions on Access: All rights reserved by the source institution

Owner Institution: FAU

Autor: Kumar, Ajoy, author Fernandez, Eduardo B. Dr., Thesis advisor College of Engineering and Computer Science, Degree grantor

Fuente: http://fau.digital.flvc.org/islandora/object/fau%3A13470


Documentos relacionados