Hybrid Network Defense Model Based on Fuzzy Evaluation
With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic netw...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2014-01-01
|
| Series: | The Scientific World Journal |
| Online Access: | http://dx.doi.org/10.1155/2014/178937 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849684667887779840 |
|---|---|
| author | Ying-Chiang Cho Jen-Yi Pan |
| author_facet | Ying-Chiang Cho Jen-Yi Pan |
| author_sort | Ying-Chiang Cho |
| collection | DOAJ |
| description | With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network’s existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter’s inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture. |
| format | Article |
| id | doaj-art-c124b6af19024bb8b287eb6e4a7f7205 |
| institution | DOAJ |
| issn | 2356-6140 1537-744X |
| language | English |
| publishDate | 2014-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | The Scientific World Journal |
| spelling | doaj-art-c124b6af19024bb8b287eb6e4a7f72052025-08-20T03:23:24ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/178937178937Hybrid Network Defense Model Based on Fuzzy EvaluationYing-Chiang Cho0Jen-Yi Pan1Department of Electrical Engineering, National Chung Cheng University, Chiayi 62102, TaiwanDepartment of Electrical Engineering, National Chung Cheng University, Chiayi 62102, TaiwanWith sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network’s existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter’s inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.http://dx.doi.org/10.1155/2014/178937 |
| spellingShingle | Ying-Chiang Cho Jen-Yi Pan Hybrid Network Defense Model Based on Fuzzy Evaluation The Scientific World Journal |
| title | Hybrid Network Defense Model Based on Fuzzy Evaluation |
| title_full | Hybrid Network Defense Model Based on Fuzzy Evaluation |
| title_fullStr | Hybrid Network Defense Model Based on Fuzzy Evaluation |
| title_full_unstemmed | Hybrid Network Defense Model Based on Fuzzy Evaluation |
| title_short | Hybrid Network Defense Model Based on Fuzzy Evaluation |
| title_sort | hybrid network defense model based on fuzzy evaluation |
| url | http://dx.doi.org/10.1155/2014/178937 |
| work_keys_str_mv | AT yingchiangcho hybridnetworkdefensemodelbasedonfuzzyevaluation AT jenyipan hybridnetworkdefensemodelbasedonfuzzyevaluation |