2022
DOI: 10.29207/resti.v6i3.4018
|View full text |Cite
|
Sign up to set email alerts
|

A Security Framework for Secure Host-to-Host Environments

Abstract: Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation, malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and verify data using different media particularly in host-to-host connections. This research focuses on data exchanged (end-to-end communication) using Multi Protocol Label Switching (MPLS), metro ethernet, and Software Defined Wide Area Network (SD-WAN) network architecture… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…ISPs involvement: This study recommends ISPs involvement based on the findings. According to Sianturi and Ramli ( 2022 ), ISPs provide some security services to their customers which can be categorised into three different categories: fully external, full internal and partially internal/partially external. Fully external is a service which provides traders with security advice such as how to set up a firewall or offer customers free security products such as antivirus software (Killalea 2000 ; Buhaljoti 2019 ).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…ISPs involvement: This study recommends ISPs involvement based on the findings. According to Sianturi and Ramli ( 2022 ), ISPs provide some security services to their customers which can be categorised into three different categories: fully external, full internal and partially internal/partially external. Fully external is a service which provides traders with security advice such as how to set up a firewall or offer customers free security products such as antivirus software (Killalea 2000 ; Buhaljoti 2019 ).…”
Section: Discussionmentioning
confidence: 99%
“…Fully internal is a service with active ISP involvement in which they implement increased filtering to address any suspicious activity (Buhaljoti 2019 ). Partially internal/Partially external is a service in which the ISPs impose policies on traders to cause them to play a role in preventing unwanted traffic for example the ISP forces traders to approve emails received from unknown senders before an email is accepted (Sianturi and Ramli 2022 ).…”
Section: Discussionmentioning
confidence: 99%
“…(MITC). "This MITC attack is" distinct "from the common Man in the Browser (MITB) and Man in" the Middle "(MITM) attacks" [10], [14]- [18].…”
Section: Introductionmentioning
confidence: 96%
“…By employing specialized algorithms and technologies, security experts can navigate this obscure landscape, collecting valuable data on emerging cyber threats from the extracted dark web content. This proactive approach enables organizations to stay ahead of malicious resources [1], identify vulnerabilities [2], and understand the tactics, techniques, and procedures they employ [3]. To harvest the dark web data, security intelligence developed a dark web crawler.…”
Section: Introductionmentioning
confidence: 99%