Analysis of Security Features in 5 Layer Internet Model
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
The Internet was originally conceived as an open, loosely inked computer network that would facilitate the free xchange of data. Security concept is relatively newer concept to that of TCP/IP suite or Layered Internet Model. But over the years ecurity functionalities in Internet Model have evolved much faster than the model itself. Multiple security functionalities are available at each layer offering redundant services. This paper gives a brief description of all the security issues and available security features at each layer. Also proposes that combining and moving basic data security features to Transport Layer rovides efficient end to end security thus to avoid redundancy in security services and to balance trade-off between security and performance. And other necessary network security features can be divided across layers. .
Authors and Affiliations
Suhas J Manangi , Parul Chaurasia , Mahendra Pratap Singh
An Evaluative Model for Information Retrieval System Evaluation: A Usercentered Approach
The key technology for knowledge management that guarantees access to large corpora of both structured and unstructured data is Information retrieval (IR) Systems. The ones commonly used on an everyday basis are search e...
An Algorithm for Finding Frequent Itemset based on Lattice Approach for Lower Cardinality Dense and Sparse Dataset
Whenever mining association rules work for large data sets frequently itemset always play an important role and enhance the performance. Apriori algorithm is widely used for mining association rule which uses frequent it...
Providing security in Vehicular ad hoc networks (VANETs) through historical data collection
Today Vehicular Ad-hoc Networks (VANETs) are needful to improve safety on the roads. But using this kind of networks has a few issues. Providing security is one of the most important issues that users of VANETs are assoc...
Approaches for Managing and Analyzing Unstructured Data
Large volumes of data that will be stored and accessed in future is unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value f...
Signature Analysis of UDP Streams for Intrusion Detection using Data Mining Algorithms
with the increased use of internet for a wide range of activity from simple data search to online commercial transactions, securing the network is extremely important for any organization. Intrusion detection becomes ex...