The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtualization is emerging as an efficient resource utilization method that eliminates dedicated physical devices. Virtualization has been widely used in computer systems such as virtual memory, virtual storage access network and wired networks - and most recently in cloud computing - to enhance the network performance, resource utilization and energy efficiency, and to achieve performance isolation...
This paper provides a design of scalable and simple remote security exercise system and its performances. Serious understaffing problem in security area. Basic security skills are necessary to all people these days. We have two fundamental problems to solve this problem.
The widely using Virtual Private Network (VPN) technology allows roaming users to build an encrypted tunnel to a VPN server, which henceforth allows roaming users to access some resources as if that computer were residing on their Home network. Although VPN technology is very useful, it imposes security threats on the remote network because its firewall does not know what traffic is flowing inside...
As a reaction to the threat of network security, the appliance of virtual private network (VPN) has become more and more prevalent. In order to support IPSec VPN on ForTER, the paper proposes an implementation model by IPSec security policy LFB, which is the critical step to achieve IPSec VPN on ForTER. Experiment results show the feasibility and effectiveness of the model.
A variety of graph-based algorithms have been proposed to generate attack graph automatically, few of which take network performance into consideration and satisfy the purpose of network vulnerability analysis. In this paper, Virtual Performance Node (VPN) is defined and an improved graph-based algorithm is proposed. The performance decrease due to attacker's incursion in the whole network is regarded...
Network security is in a daily evolving domain. Every day, new attacks, virus or intrusion techniques are released. Hence, network devices, enterprise servers or personal computers are potential targets of these attacks. Current security solutions like firewalls, intrusion detection systems (IDS) and virtual private networks (VPN) are centralized solutions which rely mostly on the analyze of inbound...
Currently, Internet, adopting the TCP/IP suits, is an end-to-end architecture. TCP/IP is an open architecture, and its design principle only focuses on the efficiency of information transmission, while it does not consider the security issues. IPsec VPN has been proposed to solve the core network security issue. However, it is believed that the current use of IP addresses to denote both the location...
Based on requirements analysis of distributed cooperative CAE, this paper proposed a distributed cooperative CAE analysis platform architecture, which has four functional modules and uses a three layered architecture: user layer, logic layer and data resource layer. Some key techniques used in the platform were discussed, including cooperative CAE analysis tools, cooperative CAE management tools,...
Enabling the automated deployment and maintenance of current and future services over the Internet is a difficult task and requires self-aware functions that can adapt the services offered by the network to changing customer demand, business goals, and/or environmental conditions using policies. This paper describes a process to realise static and dynamic service deployment, given an understanding...
Until recently, application developers could often assume a target environment that was homogeneous, reliable, secure, and centrally managed. However, with the advent of collaborative computing and data sharing, more and more new modes of interaction have evolved resulting in the need and use of distributed resources. Work within this community has led to the development of Grid technologies, which...
Safe and stable operation of secondary of power system in power plant is the key part of electric power information security. By analyzing the system construction of protection solutions of secondary part of power system in the countries of the world, on the basis, according to the protection solutions of secondary part of power system, the paper gives the construction of protection solutions of secondary...
In this paper, first, the technology of virtual private network (VPN) is presented, and a comparison of several tunnel technology is given. Secondly the structure of IPSec protocol is introduced, and FreeS/WAN software realization IPSec protocol based Linux is made a particular analysis. At last, the VPN gateway is realized by applying FreeS/WAN soft under Linux.
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.