Hybrid Network Defense Model Based on Fuzzy Evaluation

With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic netw...

Full description

Saved in:
Bibliographic Details
Main Authors: Ying-Chiang Cho, Jen-Yi Pan
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/178937
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849684667887779840
author Ying-Chiang Cho
Jen-Yi Pan
author_facet Ying-Chiang Cho
Jen-Yi Pan
author_sort Ying-Chiang Cho
collection DOAJ
description With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network’s existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter’s inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.
format Article
id doaj-art-c124b6af19024bb8b287eb6e4a7f7205
institution DOAJ
issn 2356-6140
1537-744X
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-c124b6af19024bb8b287eb6e4a7f72052025-08-20T03:23:24ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/178937178937Hybrid Network Defense Model Based on Fuzzy EvaluationYing-Chiang Cho0Jen-Yi Pan1Department of Electrical Engineering, National Chung Cheng University, Chiayi 62102, TaiwanDepartment of Electrical Engineering, National Chung Cheng University, Chiayi 62102, TaiwanWith sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network’s existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter’s inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.http://dx.doi.org/10.1155/2014/178937
spellingShingle Ying-Chiang Cho
Jen-Yi Pan
Hybrid Network Defense Model Based on Fuzzy Evaluation
The Scientific World Journal
title Hybrid Network Defense Model Based on Fuzzy Evaluation
title_full Hybrid Network Defense Model Based on Fuzzy Evaluation
title_fullStr Hybrid Network Defense Model Based on Fuzzy Evaluation
title_full_unstemmed Hybrid Network Defense Model Based on Fuzzy Evaluation
title_short Hybrid Network Defense Model Based on Fuzzy Evaluation
title_sort hybrid network defense model based on fuzzy evaluation
url http://dx.doi.org/10.1155/2014/178937
work_keys_str_mv AT yingchiangcho hybridnetworkdefensemodelbasedonfuzzyevaluation
AT jenyipan hybridnetworkdefensemodelbasedonfuzzyevaluation