10.07.2015 Views

Message from Chairman PEC Engr. Dr. Muhammad Akram Sheikh

Message from Chairman PEC Engr. Dr. Muhammad Akram Sheikh

Message from Chairman PEC Engr. Dr. Muhammad Akram Sheikh

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ENGINEER <strong>PEC</strong> September 2007the switches in the proposed framework do not generate or configurable switches into consideration that do notdirect the redundant traffic at every nook and cranny of the participate in storing and sending relatedcore layer. This traffic reduction is due to the nearby elements. These switches can not use IGMP to find out theaccessibility of regularly deemed updates, alerts, multicast hosts. Now router can direct these switchesnotifications, acknowledgements and log reports about multicast group membership using CGMP. Thismaintenance by endpoint security applications.allows multicast-enabled switches to forward multicastsonly to hosts that are new and participating in the group.As, the execution of compatible updates is only at client This shall save further need of processing cost in switchesside therefore, neither complexity nor memory upgrade is to accommodate this framework.required in the switches of the access layer. This makesthe updating process. For these reasons, the constraint of The switches deployed can be further reprogrammed tohardcode has negligible effect on the results.remove MAC of corrupt node for the strict security in thenetwork by employing some rules. Assuming the ongoingWhereas, the proposed flow of the update mechanism in developments in network infrastructure, catalystfigure 4 provides stronger resilience towards various processing and storage, adaptive networks, it can beinternal attacks and malicious code, e.g. sinkhole, proclaimed that the framework may be deployed in evencontinuous ping, hello flood. The flow of security larger networks. The customizable nature of theinformation and the update is proposed in such a way that, framework makes it viable for small and medium sizeonly the privileged applications at server can resend or organizations.rewrite the entries.Methods for future integrationThe passive elements at client require temporarilyacquired permission <strong>from</strong> the client operating system. This Now, we intend to project efforts in two directions. One is toquantifies the ownership of updating scale this solution over a larger heterogeneous network of[1][3][9][18]. Distinctiveness of the framework is its ability computers and handheld devices. That development shallto give maximum protection at first step, <strong>from</strong> trojans, logic help adaptive rules to veto or pass the communicationbombs, virus, trapdoors, backdoors and information leaks. through the endpoint.The model lab is set over MUET-campus with 30 nodeswith single authentication server. Now the next phase is tocheck the stability and scalability of the solution with allnodes all over the campus.Switch with residentvirus updatesRequiresNOHELLOs?YESHELLOhandshakeAV-HELLOhandshakeAn open standard APIs development that‘ll help loosingmonopolized control of companies in security products. Onthe other hand, it shall help customizing the varyingdemands of security perimeter in organizations.Thecooperation of catalyst vendors can be sought to design aservice-oriented hardware that inherits the potential toimplement this framework. Only a powerful module (acatalyst in our case) can perform great for securityperimeter. In general, a dedicated hardware helps toimplement a strong security policy. The verification ofpassive updates can be sought by “knowledgeconsistency checker” at distribution or access layerdevice.ConclusionACK error?YESCheck ifretransmitHELLOs?NODiscardMAC entry& ReportNOYESFrame forAuthenticityRequest toretransmitThis work presents a novel network security perimeter for atrue defense-in-depth approach which is designed <strong>from</strong> ahealthy synchronization approach embedded at first placeof the network. We have presented a hierarchical modelwith true logical separations among different services.Some services were pre-deployed as the security was apriority. We plan to recommend this framework havingconfidence as first step towards merger of antivirusservices with other network resident services.Figure 4. Switch communicating updatesThe technique presented in this framework takes non-RecommendationsAnalyzing the bottlenecks of network security devices and5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!