Skip to main content

Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment

  • Conference paper
  • First Online:
  • 941 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 215))

Abstract

In this study a Linked Network Security system based on Virtualization (LNSV) is proposed to effectively perform data transmissions in a network separated environment under the aspects of management, operation, and cost. The LNSV proposed in this study represents an open architecture in accessing its system through network connectors for all users in individual networks and can be used as a general purposed system for storing all data to be transmitted. It is possible to prevent the access of unauthorized users because the stored data files include source IP/PORT, destination IP/PORT and Hash Values. Also, it can guarantee the security of communication through transmitting and receiving data using encryption/decryption functions. Thus, the LNSV can provide safe connection services between separated networks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Yang SJ, Stotz A, Holsopple J, Sudit M, Kuhl M (2009) High level information fusion for tracking and projection of multistage cyber attacks. Inf Fusion 10(1):107–121

    Article  Google Scholar 

  2. Shahriar H, Zulkernine M (2012) Trustworthiness testing of phishing websites: a behavior model-based approach. Future Gener Comput Syst 28(8):1258–1271

    Article  Google Scholar 

  3. Nicholson A, Webber S, Dyer S, Patel T, Janicke H (2012) SCADA security in the light of cyber-warfare. Comput Secur 31(4):418–436

    Article  Google Scholar 

  4. Blasco J, Hernandez-Castro JC, Tapiador JE, Ribagorda A (2012) Bypassing information leakage protection with trusted applications. Comput Secur 31(4):557–568

    Google Scholar 

  5. Joe I, Lee S (2011) Design and implementation of storage-based data sharing system in the separate network environment. Korea Inf Commun Soc 36(5):477–483

    Article  Google Scholar 

  6. Jee J, Lee S, Lee S, Bae B, Shin Y A logical network partition scheme for cyber hacking and terror attacks. J Korean Inst Inf Scientists Eng 39(1):95–100

    Google Scholar 

  7. Kim J, Kim J, Han Y (2010) EAI-based architecture design and implementation for software development between disconnected networks. Korean Soc Internet Inf, pp 257–258

    Google Scholar 

  8. Rodríguez-Haro F, Freitag F, Navarro L, Hernánchez-sánchez E, Farías-Mendoza N, Guerrero-Ibáñez JA, González-Potes A (2012) A summary of virtualization techniques. Procedia Technol 3:267–272

    Google Scholar 

  9. Lee G, Ji J-W, Chun H-W, Lee K-W (2011) Design of an authentication system proper for hybrid cloud computing system. J Inf Secur 11(6):31–36

    Google Scholar 

  10. Kim KA, Lee DS, Kim KN (2011) ICS security risk analysis using attack tree. J Inf Secur 11(6):53–58

    Google Scholar 

Download references

Acknowledgments

This work was supported by a grant from Kyonggi university advanced Industrial Security Center of Korea Ministry of Knowledge Economy.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyong-Ho Choi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Lee, DH., Choi, KH. (2013). Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment. In: Kim, K., Chung, KY. (eds) IT Convergence and Security 2012. Lecture Notes in Electrical Engineering, vol 215. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5860-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5860-5_10

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5859-9

  • Online ISBN: 978-94-007-5860-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics