Security Testing and Evaluation on Access Layer Network

被引:0
|
作者
Salamon, Zaleha [1 ]
Ab Rahman, Ruhani [1 ]
Yahaya, Cik Ku Haroswati Che Ku [2 ]
Mahmud, Abd Razak [1 ]
Yusof, Mat Ikram [1 ]
机构
[1] Univ Teknol Mara, Fac Elect Engn, Shah Alam, Selangor, Malaysia
[2] Univ Teknol Mara Cawangan Selangor, Kampus Dengkil, Dengkil, Selangor, Malaysia
关键词
ST&E; Internal threat; Syslog; SPAN; Threat characteristic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the deployment of the security testing and evaluation (ST&E), and classifications of common internal threats on a network access layer. Many kinds of research were conducted to find the best technique to test security on the network since the internal threats are the foremost in security breaches and hazardous of eligible insider user [6,7,8]. Therefore, this paper highlights two techniques to test the network security, especially on the very limited permission access in order to identify the characteristic of threats on the access layer network. The empirical studies result achieved by syslog and (Switched Port Analyzer) SPAN protocol configuration technique. It is demonstrated that the attack can be done on the access layer. The findings on vulnerability testing also found that the severity of security threat on the network requires further action. The results which are studied will help the administrator to plan the mitigation of security threats on the access layer network.
引用
收藏
页码:184 / 188
页数:5
相关论文
共 50 条
  • [41] Design and Testing of a Computer Security Layer for the LIN Bus
    Paez, Felipe
    Kaschel, Hector
    SENSORS, 2022, 22 (18)
  • [42] Physical Layer Security Assisted 5G Network Security
    Pan, Fei
    Jiang, Yixin
    Wen, Hong
    Liao, Runfa
    Xu, Aidong
    2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [43] A physical layer perspective on access network sharing
    Pfeiffer, Thomas
    OPTICAL FIBER TECHNOLOGY, 2015, 26 : 12 - 20
  • [44] Experimental Evaluation of Network-Controlled Physical-Layer Security Through Friendly Jamming
    Hoseini, Sayed Amir
    Sadeghi, Parastoo
    Bouhafs, Faycal
    Aboutorab, Neda
    den Hartog, Frank
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 2968 - 2979
  • [45] The implementation of the link security module in an EPON access network
    Kim, KO
    Han, KS
    Yoo, TW
    2005 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), VOLS 1& 2, 2005, : 1 - 5
  • [46] Eurovision - network security through access control and watermarking
    Barda, J.
    Cheveau, L.
    EBU Technical Review, (281): : 32 - 35
  • [47] Study of network security access technology based on VPN
    Xiao, Zhengrong
    Li, Yang
    Li, Jie
    PROCEEDINGS OF THE 2015 INTERNATIONAL INDUSTRIAL INFORMATICS AND COMPUTER ENGINEERING CONFERENCE, 2015, : 1621 - 1625
  • [48] Design and Analysis of Network Security Access Control System
    Wang, Liang
    2019 3RD INTERNATIONAL CONFERENCE ON DATA SCIENCE AND BUSINESS ANALYTICS (ICDSBA 2019), 2019, : 426 - 429
  • [49] A New Access Protocol for Elevating the Security of IJTAG Network
    Kumar, Gaurav
    Riaz, Anjum
    Prasad, Yamuna
    Ahlawat, Satyadev
    2022 IEEE 31ST ASIAN TEST SYMPOSIUM (ATS 2022), 2022, : 31 - 36
  • [50] Network access and data security design for telemedicine applications
    Makris, L
    Argiriou, N
    Strintzis, MG
    SECOND IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1997, : 523 - 527