ARTICLE
TITLE

Developing A Security Model for Enterprise Networks (SMEN)

SUMMARY

Enterprise network (EN) supports thousands of users, and interconnects many networks. EN integrates different operating systems and hosts hundreds of servers that provide several services such as web applications, databases, E-mail, and others. Security threats represent a serious problem to EN. They try to damage enterprise confidentiality, integrity, and availability. Security provides protection against attacks, hacking, and data theft. In this paper, we propose a security model (SMEN) of EN. The proposed model provides security at different layers. It integrates both hardware and software security solutions. We perform a defense evaluation for the proposed model The results show that SMEN was able to detect and prevent all attacks and malwares that were induced by the framework Metasploit. Performance evaluation shows that applying proposed model has a little negative effect on bandwidth utilization and hence on network performance.

 Articles related

Hala Shaker Mehdy,Nariman Jabbar Qasim,Fadya A.Habeeb,Zinah S. Jabbar,Jamal Fadhil Tawfeq,Ahmed Dheyaa Radhi    

The enormous growth in demand for WBAN services has resulted in a new set of security challenges. The capabilities of WBAN are developing to meet these needs. The complexity, heterogeneity, and instability of the mobile context make it difficult to compl... see more


Brwa Khalil Abdullah Ahmed,Rasha Dheyaa Mahdi,Tarek Ismail Mohamed,Refed Adnan Jaleel,Mohanad Ahmed Salih,Musaddak Maher Abdul Zahra    

Over the years, the privacy of a biomedical signal processing is protected using the encryption techniques design and meta-heuristic algorithms which are significant domain and it will be more significant shortly. Present biomedical signal processing res... see more


Mallampalli Sneha,P Rama Krishna    

Financialdistortion, for example, tax evasion, is known to be a genuine procedure of offense that makes misguidedly acquired assets go to psychological oppression or other crime. This sort of criminal operations include complex systems of exchange and mo... see more


Konduru Sandeep,M Murali Krishna    

These days, it ends up open worry to give greater security to web services. Along these lines, secure user authentication is the central undertaking in security frameworks. Customarily, the greater part of the frameworks depend on sets of username and pa... see more


Md. Haidar Sharif,Ivan Despot,Sahin Uyaver    

Who does not want a home having comfortability, security, safety, and reliability? A system of interconnected devices and sensors with internet of things standards can communicate independently with less or no human interaction. With such a system, every... see more