TAILIEUCHUNG - Advanced Security Management in Metro Ethernet Networks*

This tab allows you to select a policy for client firewalls to use and the mode they are to run in. By default, a firewall runs in background mode to eliminate user interference, save system resources, and for a systems administrator to block unwanted traffic or content in a way that's completely hidden from a user. The default policy is Allow most. If some of a user’s custom applications that require network access are blocked and you consider the user experienced enough to manage all the network access request messages, you can turn the background mode off and enable Rules. | International Journal of Network Security Its Application IJNSA January 2010 Advanced Security Management in Metro Ethernet Networks Ammar Rayes Cisco Systems 255 West Tasman Drive San Jose CA 95134 . rayes@ Abstract With the rapid increase in bandwidth and the introduction of advanced IP services including voice high-speed internet access and video IPTV consumers are more vulnerable to malicious users than ever. In recent years providing safe and sound networks and services have been the zenith priority for service providers and network carriers alike. Users are hesitant to subscribe to new services unless service providers guarantee secure connections. More importantly government agencies of many countries have introduced legislations requiring service providers to keep track and records of owners of IP and MAC addresses at all time. In this paper we first present an overview of Metro Ethernet or Ethernet-To-The-Home Business ETTx and compare with various IP broadband access technologies including DSL wireless and cable. We then outline major security concerns for Metro Ethernet networks including network and subscriber end user security. Next we introduce state-of-the-art algorithms to prevent attackers from stealing any IP or MAC addresses. Our proposal is to use network management in conjunction with hardware features for security management to provide a secure and spoofing-free ETTx network. The key idea behind our proposal is to utilize network management to enforce strict port MAC IP binding in the access network to provide subscriber security. The paper then proposes an adaptive policy-based security controller to quickly identify suspected malicious users temporarily isolate them without disconnecting them from the network or validating their contracts and then carry the required analysis. The proposed controller identifies malicious users without compromising between accurate but lengthy traffic analysis and premature decision. .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.