Design and Implementation of Security Network Optimization

Article Preview

Abstract:

Optimization of computer network security technology shift in the relationship is constantly updated. Any computer network security solutions can not be designed once and for all. How seamless integration of network security technology and network security management together to make the network security implementation strategy is very important, this paper proposes a reasonable solution to improve overall network design and optimization of the security system, to develop scientific, reliable, dynamic network security optimization design, the design of enterprise network security solutions, combined with the current firewall, intrusion detection / intrusion prevention technology, VPN technology to achieve rapid escalation of the enterprise information construction in the network security system, thus the basic realization of computer network security optimization design goal.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

507-510

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] F. Martignon, S. Paris, A. Capone: Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks, Computer Networks, Vol. 53 (2009), pp.2192-2207.

DOI: 10.1016/j.comnet.2009.04.002

Google Scholar

[2] S. Kalyani, K.S. Swarup: Classifier design for static security assessment using particle swarm optimization, Applied Soft Computing, Vol. 11 (2011), pp.658-666.

DOI: 10.1016/j.asoc.2009.12.026

Google Scholar

[3] L. Angrisani, R. S. L. Moriello, M. D. Lelio, P. Morabito, M. Vadursi: Design and implementation of a reconfigurable test-bed for real-time security measurements in VoIP systems, Measurement, Vol. 46 (2013), pp.3691-3700.

DOI: 10.1016/j.measurement.2013.06.034

Google Scholar

[4] C. Bauer: A Secure Correspondent Router Protocol for NEMO Route Optimization, Computer Networks, Vol. 57 (2013), pp.1078-1100.

DOI: 10.1016/j.comnet.2012.10.021

Google Scholar

[5] C. Sanders: The Practice of Applied Network Security Monitoring, Applied Network Security Monitoring, (2014), pp.1-24.

DOI: 10.1016/b978-0-12-417208-1.00001-5

Google Scholar

[6] P. Bykovyy, V. Kochan, A. Sachenko, S. Aksoy, G. Markowsky: Security network interface for alarm systems, Computer Standards & Interfaces, Vol. 34 (2012), pp.468-475.

DOI: 10.1016/j.csi.2011.10.013

Google Scholar

[7] C. F. Kucuktezcan, V. M. I. Genc: A new dynamic security enhancement method via genetic algorithms integrated with neural network based tools, Electric Power Systems Research, Vol. 83 (2012), pp.1-8.

DOI: 10.1016/j.epsr.2011.09.004

Google Scholar

[8] H. Modares, A. Moravejosharieh, J. Lloret, R. Salleh: A survey of secure protocols in Mobile IPv6, Journal of Network and Computer Applications, Vol. 39 (2014), pp.351-368.

DOI: 10.1016/j.jnca.2013.07.013

Google Scholar

[9] C. D. Huang, R. S. Behara, J. Goo: Optimal information security investment in a Healthcare Information Exchange: An economic analysis, Decision Support Systems, Vol. 61 (2014), pp.1-11.

DOI: 10.1016/j.dss.2013.10.011

Google Scholar