Design of Network Information Security System

Article Preview

Abstract:

In this paper, in order to design the system based on the principle of the site, focusing on advanced systems, scalability and reliability at the same time, the introduction of design requirements and the target site system from two aspects of the system architecture and modular design of the system discussed and design. Full system architecture is designed for secure site information. The results show that the system can guarantee the availability and security of the site and prevent a variety of adverse information is released and the view to improve the quality of service of Web sites and Web applications.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

257-260

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] J. Diaz, D. Arroyo, F. B. Rodriguez: A formal methodology for integral security design and verification of network protocols, Journal of Systems and Software, Vol. 89 (2014), pp.87-98.

DOI: 10.1016/j.jss.2013.09.020

Google Scholar

[2] M. S. B. Mahmoud, A. Pirovano, N. Larrieu: Aeronautical communication transition from analog to digital data: A network security survey, Computer Science Review, Vol. s11–12 (2014), pp.1-29.

DOI: 10.1016/j.cosrev.2014.02.001

Google Scholar

[3] H. Mouratidis, P. Giorgini, G. Manson: When security meets software engineering: a case of modelling secure information systems, Information Systems, Vol. 30 (2005), pp.609-629.

DOI: 10.1016/j.is.2004.06.002

Google Scholar

[4] R. Jamieson, G. Low: Security and control issues in local area network design, Computers & Security, Vol. 8 (1989), pp.283-290.

DOI: 10.1016/0167-4048(89)90087-4

Google Scholar

[5] S. Gritzalis, D. Spinellis, P. Georgiadis: Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification, Computer Communications, Vol. 22 (1999), pp.697-709.

DOI: 10.1016/s0140-3664(99)00030-4

Google Scholar

[6] C. Gutiérrez, D. G. Rosado, E. F. Medina: The practical application of a process for eliciting and designing security in web service systems, Information and Software Technology, Vol. 51 (2009), pp.1712-1738.

DOI: 10.1016/j.infsof.2009.05.004

Google Scholar

[7] C. Guariniello, D. DeLaurentis: Communications, Information, and Cyber Security in Systems-of-Systems: Assessing the Impact of Attacks through Interdependency Analysis, Procedia Computer Science, Vol. 28 (2014), pp.720-727.

DOI: 10.1016/j.procs.2014.03.086

Google Scholar

[8] M. A. Aydın, A. H. Zaim, K. G. Ceylan: A hybrid intrusion detection system design for computer network security, Computers & Electrical Engineering, Vol. 35 (2009), pp.517-526.

DOI: 10.1016/j.compeleceng.2008.12.005

Google Scholar

[9] S. Atay, M. Masera: Challenges for the security analysis of Next Generation Networks, Information Security Technical Report, Vol. 16 (2011), pp.3-11.

DOI: 10.1016/j.istr.2010.10.010

Google Scholar

[10] L. Hong, W. Chen: Information theory and cryptography based secured communication scheme for cooperative MIMO communication in wireless sensor networks, Ad Hoc Networks, Vol. 14 (2014), pp.95-105.

DOI: 10.1016/j.adhoc.2013.11.008

Google Scholar

[11] M. Leitner, S. Rinderle: A systematic review on security in Process-Aware Information Systems -Constitution, challenges, and future directions, Information and Software Technology, Vol. 56 (2014), pp.273-293.

DOI: 10.1016/j.infsof.2013.12.004

Google Scholar

[12] D. Jurcut, T. Coffey, and R. Dojen: Design guidelines for security protocols to prevent replay & parallel session attacks, Computers & Security, Vol. 45 (2014), pp.255-273.

DOI: 10.1016/j.cose.2014.05.010

Google Scholar

[13] J. S. Baras: Security and Trust for Wireless Autonomic Networks Systems and Control Methods, European Journal of Control, Vol. 13 (2007), pp.105-133.

DOI: 10.3166/ejc.13.105-133

Google Scholar