SMART IDS: An Enhanced Network Security Model in IP-MPLS Based Virtual Private Network

نویسنده

  • K. C. Okafor
چکیده

Contemporary, global cyber terrorism via the internet have changed the landscape of security implementations in cooperate organizations. This paper discusses analyses and develops novel security architecture for secure transactions in Virtual Private Network (VPN) environments. Open standard VPN has been in use for a long time without addressing the security holes in VPN wired and wireless networks. Several proposals have been made in the context of enhanced intrusion detection system (IDS) and reliable VPN design which is presumed to provide an in depth solution that guarantees secure operations of the enterprise network. However, this work presents SMART Network Security System (SNSS) which is shown to be very reliable and supports multiple functionalities for both LAN and WLAN VPN setups. The SNSS models have a Multilayer Access Point Intrusion Detection System (MAPIDS) sensor for monitoring traffic and network behavior. Also, cryptographic security features viz: authentication, confidentiality, integrity and auto-replay characterize the model. As such, the system is developed for multiple integration and cost effectiveness in its deployment. Performance parameters such IP VPN tunnel delay, packet traffic throughput effects, and ping response times (ICMP) were analyzed. The modeling and simulation was executed with OPNET IT Guru application while generating our validation plots in the network model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFC 4381 Security of BGP / MPLS IP VPNs February

This document analyses the security of the BGP/MPLS IP virtual private network (VPN) architecture that is described in RFC 4364, for the benefit of service providers and VPN users. The analysis shows that BGP/MPLS IP VPN networks can be as secure as traditional layer-2 VPN services using Asynchronous Transfer Mode (ATM) or Frame Relay. Behringer Informational [Page 1] RFC 4381 Security of BGP/M...

متن کامل

Implementation of Multi Protocol Label Switching – Virtual Private Network for Corporate Networks

Recently MPLS is used for building up VPNs in IP backbone, called MPLS VPN. To provide people with voice, data and all categories of multimedia services, distinguishing between data flows is a requirement. To address these router performance, Quality of Service and traffic engineering issues, Multi Protocol Label Switching (MPLS) was proposed for IP based internetworks. To achieve the security ...

متن کامل

MPLS Virtual Private Networks

This chapter is devoted to Virtual Private Networks (VPNs) designed with Multi Protocol Label Switching (MPLS) [14, 15, 1], one of the most elusive protocols of the network stack. Saying that MPLS is “elusive” is not overemphasizing: starting from its arduous fitting within the ISO/OSI protocol stack, continuing with its entangled relationships with several other routing and forwarding protocol...

متن کامل

Network Working Group Bgp-mpls Ip Virtual Private Network (vpn) Extension for Ipv6 Vpn Bgp-mpls Ip Vpn Extension for Ipv6 Vpn

This document describes a method by which a Service Provider may use its packet-switched backbone to provide Virtual Private Network (VPN) services for its IPv6 customers. This method reuses, and extends where necessary, the "BGP/MPLS IP VPN" method for support of IPv6. In BGP/MPLS IP VPN, "Multiprotocol BGP" is used for distributing IPv4 VPN routes over the service provider backbone, and MPLS ...

متن کامل

Use of Provider Edge to Provider Edge (PE-PE) Generic Routing Encapsulation (GRE) or IP in BGP/MPLS IP Virtual Private Networks

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This document proposes an automated mechanism for establishing tunnels between provider-edge routers in a VPN, but does not provide an automated mechanism for establishing security associations for these tunnels. Without suc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013