Vous êtes sur la page 1sur 4

Sindh Univ. Res. Jour. (Sci. Ser.

SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES)


Secure Network in B2B Application by Using ACL and SLA
A.A. Abro*, H. NAWAZ++
*++
++

Department of Computer Science, Sindh Madressatul Islam University, Karachi

Corresponding Author: Haque Nawaz Lashari, E-mail: hnlashari@smiu.edu.pk, Cell# +92-333-7588408

Abstract: The motivation behind this paper is to dissecting the secure network for Business to Business (B2B) application by
Implementing Access Control List (ACL) and Service Level Agreement (SLA). This data provides the nature of attacks reported as
external or internal attacks. This paper presents the initial finding of attacks, types of attacks and there ratio within specific time. It
demonstrate the advance technique and methodology to reduce the attacks and vulnerabilities and minimize the ratio of attacks to the
networks and application and keep the network secure and runs application smoothly regarding that. It also identifies the location of
attacks, the reason behind the attack and the technique used in attacking. The whole field of system security is limitless and in an
evolutionary stage. To comprehend the exploration being performed today, foundation learning of the web and assaults, the security is
vital and in this way they are investigated.[10] It provides the statistical analytics about various attacks and nature of attacks for
acquiring the results through simulation to prove the hypothesis[10].
Keywords: Network Security, the Access Control, Securities, Availability, Confidentiality, Privacy, Integrity and vulnerability.

1.

INTRODUCTION
System security begins with confirming, for
example, username and a secret word. The world is
getting to be more interconnected with the appearance of
the web and new security advances presented.[4] There is
huge number of individual, business, military,
government data is accessible over web around the
world. Security is getting to be more criticalness in light
of licensed innovation that could be effortlessly procured
through over web[4]. Once verified, access policy
firewall authorize, e.g. what access permitted to the
clients systems. It is prevailing to counteract of
unpermitted access, the data may omit to check
conceivably unsafe stuff. E.g. infected systems during
communication transmit worms, Trojans over other
systems. The Intrusion prevention system helps to
identify and repress the malware activities of hostile
infected programming. The irregular congestion or
interruption location framework may screen the wire
shark traffic that might log for review or examine for
abnormal state. Two hosts or clients utilizing system
may to keep up privacy by correspondence. Many formal
principles and other specialized details and programming
characterize the operation of diverse parts of the www,
the Web, and machine data trade. Security is play very
key important role in whole scenario, security and its
parameter for the network and group policy object
impose better security through that. In the Digital Era,
the security is very important factor and very essential for
all organization. [12] The parameter of security is design
according to the obstacles and challenges. Security

parameter is different for different type of scenario [12].


Security management is different for all kinds of
situations. Access Control list with the support of Service
level agreement performs the better security and only
authorize user can access and enter the network and
access the information.
Figure: Attack method and Security Technology.

11]Through this way the confidentiality and security


keep and due to the implementation of service level
agreement the third party directly involve to provide the
security at their end side to maintain the secure
environment[11] and parameter is frequently pass from
one portal to another portal and user is facilitate
frequently and secure portal provides the dynamic
integration of product as well. The home based system or

small office based system immediately required the


security essentials on other hand generally large
organizations may require high support and advancement
of programming and latest equipments to keep
malevolent assaults from hacking and spamming.
2.

Following are the performance graphs captured on the


monitoring server as a result of sending packets from the
source to the respective destinations
Figure: Throughput of Physical Network
Figure: Delay of Physical Network

RELATED WORK

Network Security is the possibilities for network security


are nearly endless since it comprise of procurement and
arrangements which actualize by system controlling
authority avoid and through screen unapproved access,
change, system open assets and abuse. The system
security needed the approval of access for information by
system overseer. System security blankets both open and
private machine system [3].
The attacks such as DDos attack, Tcp hijacking,
vulnerability like eavesdropping, exploits like Trojans,
malware, virus and payloads like rootkits and key
loggers, exploiting software bugs, buffer overflows,
packet sniffing and intrusion detection systems and their
countermeasures [3]. While in term of privacy the email
hacking; spamming; bombing; DoS; and Cookies are
the attacks but there internet securities are Firewall; AntiMalware; IDS; IPS; IPSec; and SSL. [4] Where as in
accessibility are concerned assaults are Email
bombarding, DoS; Spamming and Boot framework and
Record Infectors and their engineering of web security
are IDS, Anti-Malware, Software and Firewall. Honesty
concern are infections , DoS; worms; Trojans; IP
Spoofing ; and Eavesdropping, its web securities are
Firewall ; IDS; Anti-Malware, IPSec, and SSL [4].
Privacy concerned assaults are Eavesdropping, Hacking,
Phishing, Dos and IP Spoofing and their concerned
securities are IDS, Firewall, Cryptographic Systems,
IpSec, and SSL.

Figure: Convergence time

5.

CONCLUSION

A system security framework regularly


depends on layers of insurance and comprises of

Figure: Network Security with different security


Function.

i.

Performance Evolution

different parts including systems administration checking


and security programming notwithstanding equipment

and apparatuses. To make powerful result as far as


Network Security, the unapproved client get to the assets
and rupture the security. All parts cooperate to build the
general security of the machine system. For this Security
and privacy is extremely vital to guarantee the system
security. System security is extremely critical field as its
undeniably picking up consideration as the web and
stretches. The security dangers and web convention were
broke down to focus the fundamental security advances.
The security innovations for the most part software based
however numerous fittings are likewise utilized for that
purpose. Network security is immeasurable field as it
picked up consideration as web grows. The security
dangers and web conventions were broke down to focus
the security innovation. The security innovation is
ordinarily the product based yet fittings are additionally
included in that. Well the web security more often than
not actualizes the new web convention Ipv6 may give
numerous web profits to clients. The system security may
need to develop all the more quickly manage the dangers
and vulnerabilities further later on.
5.

work has yet been carried out on this. I might want to


amplify as far as possible to apply to a whole part, where
such an expansion is sensible.
.
6.
REFERENCES
[1]

Alexliu, Torng, Meinersc Compressing Network


Access Control Lists, 1045-9219/11 IEEE In
Michigan State University East Lansing, MI 48824,
U.S.A. 2011.

[2]

SomeswarKesh, Sam Ramanujan, SidharNerur, A


Framework for analyzing ecommercesecuriy,
Information Management & Computer Security
April 2002 USA, [ISSN 0968-5227].

[3]

Zhitang Li, Yangming Ma, Li Wang, A novel realtime aggregation method on networksecurity
events, Kybernetes vol. 40 No. 5/6, 2011 China
pp. 912-920 Emerald Group Publishing Limited
DOI 10.1108/0368492111114246.

[4]

Stefan
Taubenberger,JanJurjens,
Yijun
Yu,
Resolving vulnerability identification errorsusing
security requirement on business processing
models, vol.21 No. 3,2013 pp 202-223 DOI
10.1108/IMCS-09-2012-0054 UK.

[5]

Ryan Ausanka-Crues, Methods for Access


Control:Advances& Limitations, HarveyMudd
College 301 Platt Blvd Claremont, 2010 California
USA.

[6]

S.W. Smith-A Survey of E-commerce Privacy &


Security Applications, Hanover, New Hampshire
03755 USA.

[7]

SumedhaKaushik, AnkurSinghal, Network


Security Using Cryptographic Techniques.
University Ambala, (Haryana), India 2012,
International Journal ISSN: 2277 128X.

[8]

Bradley Spengler, Increasing Performance &


Granularity In role-based Access.

[9]

Martn Abadi, Andrew Birrell, and Ted Wobber,


Access Control in a World of Software Diversity,
In University of California, Santa Cruz &
Microsoft Research, Silicon Valley 2011, U.S.A.

FUTURE WORK

In the areas of securities, there is always space


or room for the enhancement and improvement. In light
of this, I would like to expand upon my current research
with several projects to improve security. No files they
create will exist on the real file system, such as all files in
their home directories. Additionally, this mechanism
removes an entire class of bugs involving insecure file
permissions, as any files with improper permissions will
not be accessible by other, possibly malicious, users.
Exploiting a set root application on the system will not
allow. In future no doubt definitely the more better and
different parameter of security will be introduced and as
well as latest technologies regarding third parties security
providers also finishing and introducing more advance
and latest way of secure network from unauthorized user
and their illegal activity in network defiantly not
supposed to be in the favor of organization. Well about
the internet security is the set of applications more than
anything else. The future will possibly be that the
security is similar to an immune system. Improvement
and enhancement is continuous process which is
continuously lead to the perfection and betterment of the
security and confidentiality and security which is better
for the network and application. Security in digital era is
became very essential and key factor through which only
authorize user can access the resources, data and
information. The Immune system will fights off attacks
and allows only the trusted users.
Moreover, I might want to execute a comparable
gimmick to one arranged by the Linux piece. Part based
asset limits. As of now, all assets cutoff points aside from
number of courses of action are implemented for every
procedure. Constraining of number of courses of action is
carried out on a for every client premise. However no

[10] Abeta S, Methods for Access Control Advances


and Limitations, Ryan AusankaCruesHarveyMudd

College 301 Platt Blvd Claremont, California


U.S.A, 2010.
[11] Emmanuel Marilly,Alcatel Route de Nozay,
Service Level Agreement, A Main Challenge For
Next Generation Networks 2011 Marcoussis,
France.

[12] Niranjanamurthy M, DR. DharmendraChahar. The


study of E-Commerce Security Issues and
Solutions Vol. 2, Issue 7, July 2013, ISSN
(Online) : 2278-1021 ISSN (Print) : 23195940Bangalore, India.

Vous aimerez peut-être aussi