Effective Multi-Layer Security for Campus Network

Isiaka Ajewale Alimi

Abstract


The development in different communication systems as well as multimedia applications and services leads to high rate of Internet usage. However, transmission of information over such networks can be compromised and security breaches such as virus, denial of service, unauthorized access, and theft of proprietary information which may have devastating impact on the system may occur if adequate security measures are not employed. Consequently, building viable, effective, and safe network is one of the main technical challenges of information transmission in campus networks. Furthermore, it has been observed that, network threats and attacks exist from the lower layers of network traffic to the application layer; therefore, this paper proposes an effective multi-layer firewall system for augmenting the functionalities of other network security technologies due to the fact that, irrespective of the type of access control being employed, attacks are still bound to occur. The effectiveness of the proposed network architecture is demonstrated using Cisco Packet Tracer. The simulation results show that, implementation of the proposed topology is viable and offers reasonable degree of security at different network layers.

Keywords


campus network; firewall; network security; intrusion detection systems; demilitarized zone

Full Text:

PDF

References


I. A. Alimi, A. O. Mufutau, “Enhancement of network performance of an enterprises network with VLAN,†American Journal of Mobile Systems, Applications and Services, vol. 1, no. 2, pp. 82-93, July 2015.

M.P. Leong, S.Z.M. Naziri and S.Y. Perng, "Image encryption design using FPGA," 2013 International Conference on Electrical, Electronics and System Engineering, Kuala Lumpur, pp. 27-32.

I. A. Alimi and O. Aboderin, “Enhanced encryption algorithm based on a modified confusion and diffusion scheme,†American Journal of Mobile Systems, Applications and Services, vol. 1, no. 1, pp. 20-29, July 2015.

W. Cuihong, "The problems in campus network information security and its solutions," 2nd International Conference on Industrial and Information Systems, Dalian, vol.1, pp.261-264, July 2010.

Z. Wang, "A new type of intelligent network security model of the campus study," 3rd International Conference on Computer Research and Development, Shanghai, vol.2, pp.325-329, March 2011.

H. Changwei, X. Jinquan, and P. Zhengwen, "Applied research on snort intrusion detection model in the campus network," IEEE Symposium on Robotics and Applications, Kuala Lumpur, pp.596-599, 3-5 June 2012.

I. A. Alimi, A. O. Mufutau and T. D. Ebinowen, “Cost-effective and resilient large-sized campus network design,†American Journal of Information Science and Computer Engineering, vol. 1, no. 1, pp. 21-32, June 2015.

K. Han, "The study of cryptography in the application of the land management of campus network," 3rd International Conference on Intelligent System Design and Engineering Applications, Hong Kong, pp.1554-1556, Jan. 2013.

U. Mustafa, M.M. Masud, Z. Trabelsi, T. Wood, and Z. Al Harthi, "Firewall performance optimization using data mining techniques," 9th International Wireless Communications and Mobile Computing Conference, Sardinia, pp.934-940, July 2013.

H.B. Acharya, A. Joshi, and M.G. Gouda, "Firewall modules and modular firewalls," 18th IEEE International Conference on Network Protocols, Kyoto, pp.174-182, Oct. 2010.

S. Khummanee, A. Khumseela, and S. Puangpronpitag, "Towards a new design of firewall: Anomaly elimination and fast verifying of firewall rules," 10th International Joint Conference on Computer Science and Software Engineering, Maha Sarakham, pp.93-98, May 2013.

M. Stamp, Information Security Principles and Practice, Canada, John Wiley & Sons, 2006, pp. 191-198.

C. Fei, B. Bruhadeshwar, and A.X. Liu, "Cross-domain privacy-preserving cooperative firewall optimization," IEEE/ACM Transactions on Networking, vol.21, no.3, pp.857-868, June 2013.

K. Scarfone and P. Hoffman, Guidelines on Firewalls and Firewall Policy, Natl. Inst. Stand. Technol. Spec. Publ. 800-41 rev.1, pp. (2-2)-(2-6), Sep. 2009.

Z. Du, L. Jujjavarapu, and L. Meiliu, "Detecting and resolving inconsistencies in firewalls," IEEE 15th International Conference on Information Reuse and Integration, CA, pp.1-7, Aug. 2014.

M.G. Gouda and A.X. Liu, "A model of stateful firewalls and its properties," Proceedings. International Conference on Dependable Systems and Networks, pp.128-137, June 2005.




DOI: http://dx.doi.org/10.22385/jctecs.v2i0.18