Security Testing and Evaluation on Access Layer Network

被引:0
|
作者
Salamon, Zaleha [1 ]
Ab Rahman, Ruhani [1 ]
Yahaya, Cik Ku Haroswati Che Ku [2 ]
Mahmud, Abd Razak [1 ]
Yusof, Mat Ikram [1 ]
机构
[1] Univ Teknol Mara, Fac Elect Engn, Shah Alam, Selangor, Malaysia
[2] Univ Teknol Mara Cawangan Selangor, Kampus Dengkil, Dengkil, Selangor, Malaysia
关键词
ST&E; Internal threat; Syslog; SPAN; Threat characteristic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the deployment of the security testing and evaluation (ST&E), and classifications of common internal threats on a network access layer. Many kinds of research were conducted to find the best technique to test security on the network since the internal threats are the foremost in security breaches and hazardous of eligible insider user [6,7,8]. Therefore, this paper highlights two techniques to test the network security, especially on the very limited permission access in order to identify the characteristic of threats on the access layer network. The empirical studies result achieved by syslog and (Switched Port Analyzer) SPAN protocol configuration technique. It is demonstrated that the attack can be done on the access layer. The findings on vulnerability testing also found that the severity of security threat on the network requires further action. The results which are studied will help the administrator to plan the mitigation of security threats on the access layer network.
引用
收藏
页码:184 / 188
页数:5
相关论文
共 50 条
  • [31] Trust management and network layer security protocols
    Blaze, M
    Anderson, R
    Roe, M
    Lee, S
    Gligor, V
    Christianson, B
    SECURITY PROTOCOLS, 2000, 1796 : 109 - 118
  • [32] Network Security Policies: Verification, Optimization and Testing
    Al-Shaer, Ehab
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 584 - 584
  • [33] Wireless Network Penetration Testing and Security Auditing
    Wang, Shao-Long
    Wang, Jian
    Feng, Chao
    Pan, Zhi-Peng
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7
  • [34] Performance Analysis of Physical Layer Security for Cognitive Radio Non-Orthogonal Multiple Access Random Network
    Yu Baoquan
    Cai Yueming
    Hu Jianwei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (04) : 950 - 956
  • [35] Open Radio Access Network RIC Empowered Reconfigurable Intelligent Surface: A Physical-Layer Security Perspective
    Lien, Shao-Yu
    Tseng, Chih-Cheng
    Hung, Wei-Cheng
    Tsai, Cheng-You
    Liu, Ting-Yu
    Deng, Der-Jiunn
    Lin, Yuan-Chun
    Lin, Shih-Cheng
    Chang, Chia-Chan
    Chang, Sheng-Fuh
    IEEE Transactions on Industrial Cyber-Physical Systems, 2024, 2 : 615 - 625
  • [36] Network Protocol Security Testing Based on Fuzz
    Li Haifeng
    Wang Shaolei
    Zhang Bin
    Shuai Bo
    Tang Chaojing
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 955 - 958
  • [37] A STUDY OF NETWORK SECURITY USING PENETRATION TESTING
    Shanmugapriya, R.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 371 - 374
  • [38] Security Testing of Active Optical Network Devices
    Oujezsky, Vaclav
    Chapcak, David
    Horvath, Tomas
    Munster, Petr
    2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2019, : 9 - 13
  • [39] The Study on Network Security Strategy based on Security Evaluation
    Bi, Yan
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 446 - 450
  • [40] Testing antivirus engines to determine their effectiveness as a security layer
    Haffejee, Jameel
    Irwin, Barry
    2014 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2014,