A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability

نویسندگان

  • Hyuncheol Kim
  • Sunghae Kim
  • Seong-Jin Ahn
  • Jin-Wook Chung
چکیده

Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource modifications. The protecting ARP which relies on hosts caching reply messages can be the primary method in obstructing the misuse of the network. This paper proposes a network service access control framework, which provides a comprehensive, hostby-host perspective on IP (Internet Protocol) over Ethernet networks security. We will also show how this framework can be applied to network elements including detecting, correcting, and preventing security vulnerabilities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protection route Mechanism for Survivability in FTTH-PON Network

This paper described the proposed protection route mechanism and simulation of protection mechanism model in order to achieve survivability in PON-FTTH. Due to large transport capacity achieved by the network, failures which occur cause huge losses of data and greatly influence upon a large number of users over a wide area. Therefore, the survivability of the whole network has to be examined mo...

متن کامل

Protection for Tree-Based EPON-FTTH Architecture Using Combination ACS and OXADM

s: Ethernet Passive Optical Network (EPON) was proposed to overcome the bandwidth bottleneck at the Access Network due to its simplicity, cost effectiveness and wide spread deployment. A failure in access networks can cause serious problem, because access network transmit aggregated high-speed traffic from hundreds of subscribers. Protection and restoration mechanisms have been applied in backb...

متن کامل

A Cost Effective Approach for WDM Network Protection under Critical Duct Constraints

-In this paper, protection strategies of WDM networks are viewed from a cost perspective. The goal is to minimize the network cost while ensuring the network survivability. In WDM networks, multi fibers are kept in a duct and that duct can be treated as a link SRLG (shared risk link group). With the increase in size and number of shared risk link groups, capacity efficiency of shared-path prote...

متن کامل

Self-Healing Hybrid Protection Architecture for Passive Optical Networks

Expanding size of passive optical networks (PONs) along with high availability expectation makes the reliability performance a crucial need. Most protection architectures utilize redundant network components to enhance network survivability, which is not economical. This paper proposes new self-healing protection architecture for passive optical networks (PONs), with a single ring topology and ...

متن کامل

Protected Framework for Securing Sensitive Information from Unauthorized Users

The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The Protected protection mechanism is a much important concern in the case of sharing the sensitive information. The Protected protection mechanism provides better Protected for the sensitive information which is to be shared. The generally used Pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004