With the development of incipient technologies, user devices becoming more exposed and ill-used by foes. In upcoming decades, traditional security measures will not be sufficient enough to handle this huge threat towards distributed hardware and software. Lack of standard network attack taxonomy has become an indispensable dispute on developing a clear understanding about the attacks in order to have an operative protection mechanism. Present attack categorization techniques protect a specific group of threat which has either messed the entire taxonomy structure or ambiguous when one network attacks get blended with few others attacks. Hence, this raises concerns about developing a common and general purpose taxonomy. In this study, a sequential question-answer based model of categorization is proposed. In this article, an intrusion detection framework and threat grouping schema are proposed on the basis of four sequential questions (“Who”, “Where”, “How” and “What”). We have used our method for classifying traditional network attacks in order to identify initiator, source, attack style and seriousness of an attack. Another focus of the paper is to provide a preventive list of actions for network administrator as a guideline to reduce overall attack consequence. Recommended taxonomy is designed to detect common attacks rather than any particular type of attack which can have a practical effect in real life attack classification. From the analysis of the classifications obtained from few infamous attacks, it is obvious that the proposed system holds certain benefits related to the prevailing taxonomies. Future research directions have also been well acknowledged.
Nowadays, the rapidly increasing energy consumption of communication equipment is an economic and environmental problem that needs to be addressed. Small Local Area Networks (LAN) switches in the US alone consume about 8 TWh per year that corresponds to hundreds of millions of US dollars in electricity. A main reason is communication equipment, due to the fact that, Ethernet switches have to active all days even in low-traffic time. There are many approaches to make the switches sensitive with the different traffic load environment, but they have to put some changes to current Ethernet that cause the incompatibility issues. This paper proposes a new device called Modified Multiplexer (MUXER), which can control the power functions of switches without modifying the current Ethernet protocol. The MUXER devices are put before the switches in the network, which provide some functions to transfer incoming Media Access Control (MAC) data frames to the corresponding switches managed by MUXERs. By using the proposed device, the wasted energies in the network can be reduced, especially in the specified low-traffic time. We describe the result of numerical analysis and compare detail power consumption data between a normal and a network where MUXERs are installed. In this work, the explained result shows that if a network administrator can estimate the number of MUXER needed for a particular network and install accordingly, our device can provides a significant energy saving.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.