Asian Journal of Information Technology

Year: 2014
Volume: 13
Issue: 9
Page No. 446 - 453

Functioning Aspects of Secure Network and Design of Log Analyser

Authors : S. Manikandan, R. Prabhu , D. Sureshbabu and P. Vijayanand

Abstract: Geographically distributed and heterogeneous networks like internet with millions of entry points, users and transmission paths, depict a typical insecure network. The points where an organization’s private network interfaces with the internet are vulnerable to potential security attacks. Almost all organizations take care to protect their networks through firewalls, proxy servers and the like but recently even these so called secure networks are being subjected to numerous intrusions. The logs generated by the firewalls are so huge that it is even more difficult to find the source of attack in the event of a security breach. In this study, researchers present a progressive approach to strengthen the security of a private network beginning from the server level till the gateway interface to the internet. Routers in front of the firewall can be configured using context based access control in order to perform an initial security screening. Further, the design of a log analyser is discussed which details the process of collecting and analysing logs from firewalls and application gateways, in an efficient and less time consuming manner.

How to cite this article:

S. Manikandan, R. Prabhu , D. Sureshbabu and P. Vijayanand, 2014. Functioning Aspects of Secure Network and Design of Log Analyser. Asian Journal of Information Technology, 13: 446-453.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved