Abstract
In this study a Linked Network Security system based on Virtualization (LNSV) is proposed to effectively perform data transmissions in a network separated environment under the aspects of management, operation, and cost. The LNSV proposed in this study represents an open architecture in accessing its system through network connectors for all users in individual networks and can be used as a general purposed system for storing all data to be transmitted. It is possible to prevent the access of unauthorized users because the stored data files include source IP/PORT, destination IP/PORT and Hash Values. Also, it can guarantee the security of communication through transmitting and receiving data using encryption/decryption functions. Thus, the LNSV can provide safe connection services between separated networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yang SJ, Stotz A, Holsopple J, Sudit M, Kuhl M (2009) High level information fusion for tracking and projection of multistage cyber attacks. Inf Fusion 10(1):107–121
Shahriar H, Zulkernine M (2012) Trustworthiness testing of phishing websites: a behavior model-based approach. Future Gener Comput Syst 28(8):1258–1271
Nicholson A, Webber S, Dyer S, Patel T, Janicke H (2012) SCADA security in the light of cyber-warfare. Comput Secur 31(4):418–436
Blasco J, Hernandez-Castro JC, Tapiador JE, Ribagorda A (2012) Bypassing information leakage protection with trusted applications. Comput Secur 31(4):557–568
Joe I, Lee S (2011) Design and implementation of storage-based data sharing system in the separate network environment. Korea Inf Commun Soc 36(5):477–483
Jee J, Lee S, Lee S, Bae B, Shin Y A logical network partition scheme for cyber hacking and terror attacks. J Korean Inst Inf Scientists Eng 39(1):95–100
Kim J, Kim J, Han Y (2010) EAI-based architecture design and implementation for software development between disconnected networks. Korean Soc Internet Inf, pp 257–258
RodrÃguez-Haro F, Freitag F, Navarro L, Hernánchez-sánchez E, FarÃas-Mendoza N, Guerrero-Ibáñez JA, González-Potes A (2012) A summary of virtualization techniques. Procedia Technol 3:267–272
Lee G, Ji J-W, Chun H-W, Lee K-W (2011) Design of an authentication system proper for hybrid cloud computing system. J Inf Secur 11(6):31–36
Kim KA, Lee DS, Kim KN (2011) ICS security risk analysis using attack tree. J Inf Secur 11(6):53–58
Acknowledgments
This work was supported by a grant from Kyonggi university advanced Industrial Security Center of Korea Ministry of Knowledge Economy.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Lee, DH., Choi, KH. (2013). Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_10
Download citation
DOI: https://doi.org/10.1007/978-94-007-5860-5_10
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5859-9
Online ISBN: 978-94-007-5860-5
eBook Packages: EngineeringEngineering (R0)