Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 215)

Abstract

In this study a Linked Network Security system based on Virtualization (LNSV) is proposed to effectively perform data transmissions in a network separated environment under the aspects of management, operation, and cost. The LNSV proposed in this study represents an open architecture in accessing its system through network connectors for all users in individual networks and can be used as a general purposed system for storing all data to be transmitted. It is possible to prevent the access of unauthorized users because the stored data files include source IP/PORT, destination IP/PORT and Hash Values. Also, it can guarantee the security of communication through transmitting and receiving data using encryption/decryption functions. Thus, the LNSV can provide safe connection services between separated networks.

Keywords

Access control Network security Hypervisor Virtualization Separate network 

Notes

Acknowledgments

This work was supported by a grant from Kyonggi university advanced Industrial Security Center of Korea Ministry of Knowledge Economy.

References

  1. 1.
    Yang SJ, Stotz A, Holsopple J, Sudit M, Kuhl M (2009) High level information fusion for tracking and projection of multistage cyber attacks. Inf Fusion 10(1):107–121CrossRefGoogle Scholar
  2. 2.
    Shahriar H, Zulkernine M (2012) Trustworthiness testing of phishing websites: a behavior model-based approach. Future Gener Comput Syst 28(8):1258–1271CrossRefGoogle Scholar
  3. 3.
    Nicholson A, Webber S, Dyer S, Patel T, Janicke H (2012) SCADA security in the light of cyber-warfare. Comput Secur 31(4):418–436CrossRefGoogle Scholar
  4. 4.
    Blasco J, Hernandez-Castro JC, Tapiador JE, Ribagorda A (2012) Bypassing information leakage protection with trusted applications. Comput Secur 31(4):557–568Google Scholar
  5. 5.
    Joe I, Lee S (2011) Design and implementation of storage-based data sharing system in the separate network environment. Korea Inf Commun Soc 36(5):477–483CrossRefGoogle Scholar
  6. 6.
    Jee J, Lee S, Lee S, Bae B, Shin Y A logical network partition scheme for cyber hacking and terror attacks. J Korean Inst Inf Scientists Eng 39(1):95–100Google Scholar
  7. 7.
    Kim J, Kim J, Han Y (2010) EAI-based architecture design and implementation for software development between disconnected networks. Korean Soc Internet Inf, pp 257–258Google Scholar
  8. 8.
    Rodríguez-Haro F, Freitag F, Navarro L, Hernánchez-sánchez E, Farías-Mendoza N, Guerrero-Ibáñez JA, González-Potes A (2012) A summary of virtualization techniques. Procedia Technol 3:267–272Google Scholar
  9. 9.
    Lee G, Ji J-W, Chun H-W, Lee K-W (2011) Design of an authentication system proper for hybrid cloud computing system. J Inf Secur 11(6):31–36Google Scholar
  10. 10.
    Kim KA, Lee DS, Kim KN (2011) ICS security risk analysis using attack tree. J Inf Secur 11(6):53–58Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Deptartment of Industrial SecurityKyonggi UniversitySuwon-SiSouth Korea
  2. 2.Center for IndustryKyonggi UniversitySuwon-SiSouth Korea

Personalised recommendations