Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment
In this study a Linked Network Security system based on Virtualization (LNSV) is proposed to effectively perform data transmissions in a network separated environment under the aspects of management, operation, and cost. The LNSV proposed in this study represents an open architecture in accessing its system through network connectors for all users in individual networks and can be used as a general purposed system for storing all data to be transmitted. It is possible to prevent the access of unauthorized users because the stored data files include source IP/PORT, destination IP/PORT and Hash Values. Also, it can guarantee the security of communication through transmitting and receiving data using encryption/decryption functions. Thus, the LNSV can provide safe connection services between separated networks.
KeywordsAccess control Network security Hypervisor Virtualization Separate network
This work was supported by a grant from Kyonggi university advanced Industrial Security Center of Korea Ministry of Knowledge Economy.
- 4.Blasco J, Hernandez-Castro JC, Tapiador JE, Ribagorda A (2012) Bypassing information leakage protection with trusted applications. Comput Secur 31(4):557–568Google Scholar
- 6.Jee J, Lee S, Lee S, Bae B, Shin Y A logical network partition scheme for cyber hacking and terror attacks. J Korean Inst Inf Scientists Eng 39(1):95–100Google Scholar
- 7.Kim J, Kim J, Han Y (2010) EAI-based architecture design and implementation for software development between disconnected networks. Korean Soc Internet Inf, pp 257–258Google Scholar
- 8.Rodríguez-Haro F, Freitag F, Navarro L, Hernánchez-sánchez E, Farías-Mendoza N, Guerrero-Ibáñez JA, González-Potes A (2012) A summary of virtualization techniques. Procedia Technol 3:267–272Google Scholar
- 9.Lee G, Ji J-W, Chun H-W, Lee K-W (2011) Design of an authentication system proper for hybrid cloud computing system. J Inf Secur 11(6):31–36Google Scholar
- 10.Kim KA, Lee DS, Kim KN (2011) ICS security risk analysis using attack tree. J Inf Secur 11(6):53–58Google Scholar