MULTI LAYER ADAPTIVE NETWORK SECURITY APPROACH
Main Article Content
Abstract
As Information Technology makes impact nearly in every aspect of our lives especially with the emergence of web applications especially ecommerce and social networking websites, the amount of data generated and stored continues to grow at a very high rate which necessitates the improved data security policies and mechanisms in order to ensure that the data transmission is safe and secure across the networks. Network security refers to all the characteristics, features, measures, operational procedures, protocols , policies and practices required to monitor an unauthorized access to data and to provide an acceptable level of protection for transmission of data across the networks and at the same time preserve the, integrity , availability and confidentiality of information. Adapt is defined as: “become adjusted to new conditionsâ€. With reference to software systems the type of adaptation is often defined with reference to when it is achieved. Adaptation can be static where the system is modified at design, compile or link time. It can also be dynamic where the system is modified or modifies its own behavior, at runtime. With reference to the definition of network security, adaptive network security is considered as a runtime modification of the security policies and mechanisms employed to secure sensitive data.In spite of all the security products available today (mostly non-adaptive), on-going efforts and current solutions, it is known fact that security across networks and applications is not adequate.
This paper aims at designing a secure adaptive network solution which shall provide a complete set of security policies and mechanisms for creating a self adaptive security solution for transmission of data across network applications and environments. The type of security addressed in this paper is specifically data privacy and ‘adaptive’ implies the ability to change the security policies and mechanisms at runtime through an intelligent trade off policy.
This paper aims at designing a secure adaptive network solution which shall provide a complete set of security policies and mechanisms for creating a self adaptive security solution for transmission of data across network applications and environments. The type of security addressed in this paper is specifically data privacy and ‘adaptive’ implies the ability to change the security policies and mechanisms at runtime through an intelligent trade off policy.
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.