Multi-Layer Network Security Architecture
نویسندگان
چکیده
منابع مشابه
The Architecture and Implementation of Network Layer Security in UNIX
swIPe is a network-layer security protocol for the IP protocol suite. This paper presents the architecture, design philosophy, and performance of an implementation of swIPe under several variants of Unix. swIPe provides authentication, integrity, and confidentiality of IP datagrams, and is completely compatible with the existing IP infrastructure. To maintain this compatibility, swIPe is implem...
متن کاملNetwork Layer Security
INTRODUCTION Modern computer networks are characterized by layered protocol architectures, allowing network designs to accommodate unlimited applications and interconnection techniques. This layered approach allows protocols to become modularized; that is, developed independently and put together with other protocols in such a way as to create one complete protocol. The recognized basis of prot...
متن کاملOn motion detection through a multi-layer neural network architecture
A neural network model called lateral interaction in accumulative computation for detection of non-rigid objects from motion of any of their parts in indefinite sequences of images is presented. Some biological evidences inspire the model. After introducing the model, the complete multi-layer neural architecture is offered in this paper. The architecture consists of four layers that perform seg...
متن کاملAlgorithms and architecture for multiusers, multi-terminal, multi-layer information theoretic security
As modern infrastructure systems become increasingly more complex, we are faced with many new challenges in the area of information security. In this thesis we examine some approaches to security based on ideas from information theory. The protocols considered in this thesis, build upon the “wiretap channel,” a model for physical layer security proposed by A. Wyner in 1975. At a higher level, t...
متن کاملUnified Security Architecture for enterprise network security
to threats from within and outside the organization. The new openness of networked communications introduces new ethical, financial, and regulatory pressures to protect networks and enterprises from internal and external threats and attacks. Every IT security professional should be up-to-date on the Top Ten challenges to enterprise security—and the latest recommendations to address those challe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Magazine
سال: 2020
ISSN: 0163-6804,1558-1896
DOI: 10.1109/mcom.2020.9311934