Security Testing and Evaluation on Access Layer Network

被引:0
|
作者
Salamon, Zaleha [1 ]
Ab Rahman, Ruhani [1 ]
Yahaya, Cik Ku Haroswati Che Ku [2 ]
Mahmud, Abd Razak [1 ]
Yusof, Mat Ikram [1 ]
机构
[1] Univ Teknol Mara, Fac Elect Engn, Shah Alam, Selangor, Malaysia
[2] Univ Teknol Mara Cawangan Selangor, Kampus Dengkil, Dengkil, Selangor, Malaysia
关键词
ST&E; Internal threat; Syslog; SPAN; Threat characteristic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the deployment of the security testing and evaluation (ST&E), and classifications of common internal threats on a network access layer. Many kinds of research were conducted to find the best technique to test security on the network since the internal threats are the foremost in security breaches and hazardous of eligible insider user [6,7,8]. Therefore, this paper highlights two techniques to test the network security, especially on the very limited permission access in order to identify the characteristic of threats on the access layer network. The empirical studies result achieved by syslog and (Switched Port Analyzer) SPAN protocol configuration technique. It is demonstrated that the attack can be done on the access layer. The findings on vulnerability testing also found that the severity of security threat on the network requires further action. The results which are studied will help the administrator to plan the mitigation of security threats on the access layer network.
引用
收藏
页码:184 / 188
页数:5
相关论文
共 50 条
  • [21] Security analysis of network access control implementations
    Cetin, F.
    Dagonnier, T.
    Oechslin, P.
    RELIABILITY, RISK AND SAFETY: THEORY AND APPLICATIONS VOLS 1-3, 2010, : 1907 - 1914
  • [22] Secure Dynamic Routing Protocols based on Cross-Layer Network Security Evaluation
    Chuang, I-Hsun
    Su, Wei-Tsung
    Kuo, Yau-Hwang
    2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2012, : 303 - 308
  • [23] A Novel Multiple Access Scheme with Physical Layer Security
    Shao, Xuanbo
    Wu, Zhanji
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 36 - 40
  • [24] The Evaluation Model for Network Security
    Lu, Zhiyong
    Zhou, Yunyan
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 690 - 694
  • [25] Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
    Edris E.K.K.
    Aiash M.
    Loo J.
    Array, 2022, 16
  • [26] Penetration testing - An useful form of computer network security testing
    Dong, LX
    Wang, JZ
    ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 4458 - 4460
  • [27] Trust management and network layer security protocols
    Blaze, M
    Ioannidis, J
    Keromytis, AD
    SECURITY PROTOCOLS, 2000, 1796 : 103 - 108
  • [28] MULTI-LAYER NETWORK SECURITY ARCHITECTURE
    Chan, Vincent W. S.
    IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (12) : 4 - 4
  • [29] Quantum photonic network and physical layer security
    Sasaki, Masahide
    Endo, Hiroyuki
    Fujiwara, Mikio
    Kitamura, Mitsuo
    Ito, Toshiyuki
    Shimizu, Ryosuke
    Toyoshima, Morio
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2017, 375 (2099):
  • [30] Cognitive Security in Software Define Network Layer
    Kavitha, R.
    Priya, N.
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 69 - 74