Security Testing and Evaluation on Access Layer Network

被引:0
|
作者
Salamon, Zaleha [1 ]
Ab Rahman, Ruhani [1 ]
Yahaya, Cik Ku Haroswati Che Ku [2 ]
Mahmud, Abd Razak [1 ]
Yusof, Mat Ikram [1 ]
机构
[1] Univ Teknol Mara, Fac Elect Engn, Shah Alam, Selangor, Malaysia
[2] Univ Teknol Mara Cawangan Selangor, Kampus Dengkil, Dengkil, Selangor, Malaysia
关键词
ST&E; Internal threat; Syslog; SPAN; Threat characteristic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the deployment of the security testing and evaluation (ST&E), and classifications of common internal threats on a network access layer. Many kinds of research were conducted to find the best technique to test security on the network since the internal threats are the foremost in security breaches and hazardous of eligible insider user [6,7,8]. Therefore, this paper highlights two techniques to test the network security, especially on the very limited permission access in order to identify the characteristic of threats on the access layer network. The empirical studies result achieved by syslog and (Switched Port Analyzer) SPAN protocol configuration technique. It is demonstrated that the attack can be done on the access layer. The findings on vulnerability testing also found that the severity of security threat on the network requires further action. The results which are studied will help the administrator to plan the mitigation of security threats on the access layer network.
引用
收藏
页码:184 / 188
页数:5
相关论文
共 50 条
  • [1] Network Security Evaluation Algorithm Based on Access Level Vectors
    Li, Kai
    Gu, Naijie
    Bi, Kun
    Ji, Hongzhu
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1538 - 1544
  • [2] Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection
    Hu, Langtao
    Zheng, Xin
    Chen, Chunsheng
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [3] Security of Broadband Access Network
    Wang Deqiang(Network Division of ZTE Corporation
    ZTE Communications, 2007, (01) : 37 - 41
  • [4] Research on Network Security Level Evaluation Technology for WLAN Access Devices
    Xie, Dehua
    Chen, Liang
    Wang, Bowei
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 671 - 675
  • [5] Integrated network security protocol layer for open-access power distribution systems
    Mander, Todd
    Nabhani, Farhad
    Wang, Lin
    Cheung, Richard
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 3646 - 3653
  • [6] Network Access Security for the Internet: Protocol for Carrying Authentication for Network Access
    Marin-Lopez, Rafa
    Pereniguez-Garcia, Fernando
    Gomez-Skarmeta, Antonio F.
    Ohba, Yoshihiro
    IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (03) : 84 - 92
  • [7] Vehicle Network Security Testing
    Khan, Jihas
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 119 - 123
  • [8] Security level evaluation system for wireless local area network access devices
    Zhang M.
    Wu W.
    Song Y.
    Hu A.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2020, 60 (05): : 371 - 379
  • [9] Sensor Network Security Issues at Network Layer
    Habib, Asif
    ICAST 2008: PROCEEDINGS OF 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN SPACE TECHNOLOGIES: SPACE IN THE SERVICE OF MANKIND, 2008, : 56 - 61
  • [10] Security Analysis of LTE Access Network
    Vintila, Cristina-Elena
    Patriciu, Victor-Valeriu
    Bica, Ion
    PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, : 29 - 34