Layered Defense Approach: Towards Total Network Security

Kalaivani CHELLAPPAN, Ahmed Shamil Mustafa, Mohammed Jabbar Mohammed, Aqeel Mezher Thajeel

Abstract


Computer network security is one of the most critical issues facing different business organizations. Protecting organization’s data - which is the core of the organization existence- against attacks is very important.  Multiple security tools should be implemented in the same time in order to protect this data, as modern attacks can easily bypass most single operated security systems.  A well designed security system which take into considerations most possible network threats is necessary to prevent intruders and provide secure data exchange. In this paper, layered defense approach is presented as a best solution to build network security system. In this approach multiple mechanisms are used together to keep high security level.


Keywords


network security; layered defense approach; risk analysis;computer network attacks

Full Text:

PDF

References


Banathy, A., Panozzo, G., Gordy, A. and Senese, J., 2013. A Layered Approach to Network Security, indestrial IP database, available at :< http://www.industrial-ip.org> [accessed 15 November 2014].

Shenk, J., 2013. Layered security: Why it works, SANS institute reading room database. availabel at: < http://www.sans.org/reading-room> [accessed 15 November 2014].

De Capite, D., 2006. Self-Defending Networks: The Next Generation of Network Security, Cisco press, NewYork.

Kumaravel, A., 2013. Multi-classification Approach for Detecting Network Attacks. IEEE conference on information and communications technology ICT, Jeju island, April 11-12 2013. Available at:, pp.1114-1117 [accessed 12 December 2014].

Orebaugh, A. and Pinkard, B., 2008. Nmap in the Enterprise: Your Guide to Network Scanning. [e-book] Syngress press. available at: [accessed 03 December 2014].

Harris, J., 2002, Cisco Network Security Little Black Book. [e-book] Paraglyph press. available at: [accessed 17 December 2014].

Hsu, F. H., and Chiueh, T., 2008. Scalable Network-based Buffer Overflow Attack Detection, IEEE Xplore database, available at: , pp.163-172, [accessed 10 December 2014].

International Standards Office, 2011. BS ISO/IEC 27005-2011, Information technology- Security techniques- Information security risk management: Electronoic documents. ISO. available at: [accessed 21 December 2014].

Stonebumer, G., Goguen, A., and Feringa A., 2002. Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology e-library, available at:< http://www.nis.gov>, p.54 [accessed 23 December 2014].

Fraser, B., 1997. Site Security Handbook, RFC 2196, available at: [accessed 10/12/2014].

Malik, S., 2002. Network Security Principles and Practices. [e-book] Cisco Press. available at: [accessed 23 December 2014].

Gouda, M. and Liu, A., 2007. Structured firewall design, International Journal of Computer and Telecommunications Networking, Vol 51, Issue 4 ; pp1106–1120.

Beigh, B., Peer, A., 2012. Intrusion Detection and Prevention System: Classification and Quick Review, ARPN Journal of Science and Technology, Vol 2, No 7, pp.661-675.

Conkil, WM. and White G., 2010. Principles of Computer Security: CompTIA Security+ and Beyond. 3rd ed [e-book] McGraw-Hill/Osborne Media, available at: , [accessed 01 December 2014].

Shucheng, Y. et al., 2010. Achieving secure, scalable, and fine-grained data access control in cloud computing, IEEE conference on computer communications, San Diego, Ca, March 15-19 2010. Avaialbel at , pp. 1-9, [accessed 07 December 2014].

Huu, T. et al., 2005. A trust based access control framework for P2P file-sharing systems, Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Hawaii island, US, January 3-6 2005. Available at: , pp. 1-10, [accessed 16 December 2014].


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)