أعلان الهيدر

الرئيسية Everything about Network Security

Everything about Network Security


There is a continuous change happening in Network applications, protocols, topologies and usage patterns. The Network of the Future (NF) is going to be outfitted by the modern and advance technologies that give higher available bandwidth, fast routing, switching and content delivery over advanced optical, infrared and satellite network. The visions of NF in terms of offered services are:
·         Support wide spreading access and advanced mobility even in hostile atmospheres.
·         Provide international access to all closed infrastructures, like governmental, financial, medical and military networks, maximizing the need for global authentication and confidentiality frameworks, as well as availability of networking services and infrastructures.
·         Increase the number of devices connected to netwokls to trillions by inter-connecting on the IP or access level mobile or embedded things that monitor user' actions and locations.
·         Support complicated services that get to learn from users' preferences and multiply the usage of social networks, requiring more advanced privacy frameworks.
·         increase the amount of digital content which can be accessed by individuals, supporting the needs for flexible and encrypted techniques for Digital Rights Management (DRM), and
·         Move to an information- centric paradigm, where composite services are going to be orchestrated for information that is either published for a group of authorized subscribers or published in a public domain.
Meanwhile, during the growth of the internet, there is another growth in malicious activity that has been increased in terms of frequency, scale, sophistication and impact.  However, the countermeasures of security and privacy have also become more essential than ever. A lot of effort is directed towards developing mechanisms that decrease the harm of such threats. But in the same time we find the current mechanism rely on specific network characteristics that change and vary through time, not ensuring them to be applicable in NF. The security mechanisms that are designed for the NF have to operate separately from the network design and characteristics. In addition to that, the security and privacy mechanisms are expected to be flexible and adaptive enough to fit enough in domains where vulnerabilities have been recognized or attacks have been reported, and scalable enough to increase their countermeasures to multiple control areas. As a result, measuring security and privacy is of a great importance to make more flexible decisions and increase the focus of countermeasures where appropriate.

Vision
 The estimated target date for prototyping and phased deployment of Future Networks should roughly fall between 2015 and 2020. This estimate is based on two factors: The first one is the status of the existing and developing technologies that might be employed in the experimentation and advancement of FNs. The second one is that any actual development that might happen well beyond that estimate will be too speculative and outside the mandate of this document.
Any international multi-service infrastructure contains a number of networks and network technologies put in various vertical (stacked) and horizontal (peered) combinations.
The nature of such combined network implies a mixture of networks at various stages of evolution. Some current components might be replaced by a new network technology, some may be optimized by a future technique and about the completely new ones, they may be added.   In addition to that, the components of network will change and vary dynamically from one telecommunication instance to another relying on the service being considered, features invoked and routing choices related.
Various development and migration strategies may be used to accommodate coming and future network technologies.  Each case of these is to be examined on its merits and its relation to the role taken by the network technology with consideration as part of the future global infrastructure.
Usage scenarios and deployment cases also will need to be taken in consideration when the research has been completed for the area(s) under consideration , and appropriate conclusions reached and agreed.
For networks that will come in the future to be a part of essential social infrastructure, they should be researched and developed with consideration to the following three points of view:  Network for/of Individual, Network for/of Society and Network for/ on Earth.

 Objectives
“Design goals” should be supported by Future Networks. 
 The design goals of Future Network can be discussed from the four kinds of view: commercial view, social view, and operation and management view.

 6.1 Service View
Firstly from service view, FN will need to provide satisfaction for an extremely wide range of customer demands. FN should:
·          be programmable network architecture that is easy to implement any kind of service network. Diverse users actually demanded this service network. As a result, Future Network forms a network of networks, i.e. meta-network architecture.
·          To give support to bandwidths ranging from narrow ones to ultra-wide ones.
·            Support a good wide range of latency to adapt applications and services characteristics.
·          To provide a place for a huge number of wide variety of terminal devices.
·          provide apps and services that don't depend on user terminals or devices.
·          provide high reliability network services.
·          support flexible mobility to guarantee widespread/ pervasive communication atmosphere.
·          To acquire and get equipped with developed security mechanisms against DDoS attacks, tapping, impersonation, etc.
·          To have the ability to manage digital assets like digital content copyrights.

Social View
From the corner of social view, FN is considered as a new model of future social infrastructure that gives allows and enables social growth and environmental conservation. FN should:
·          Support private and/or public social apps such as collaborations, health care, transportation, and so on.
·          Provide services that take part in saving the environment.
·          To make its design consider power consumption incorporating device, system, provisioning, operations, and management aspects carefully

Commercial View
 In Future Network, each participant is technically guaranteed proper economic returns according to their participation, thus the tussle is resolved.

 Operation and Management View
 Regarding Operation and management view, Future Network should ease complexity of operation and management. FN should:
·           enable flexible migration between different network services.
·          be able to place both in-service and experimental technologies and use them properly.
·          be able to support and sustain new technologies.
·          have the capacity to be deployed flexibly.
·          support effective utilization networked ICT resources depending on the changes in demand.
·          support the automation of network and service management like self-stabilization and self-management functions etc.
·          have the capacity to provide customized service for individual customers depending on their context.
·          consider the customer's QoE ( Quality of Experience) besides QoS.
·          provide several platforms that are easy to be used by the customers to create new businesses.
·          have the capacity to get accurate real-time information of network and service resource status and health.
·          give support to simple and flexible knowledge representation of network and service management information.
·          have the capacity to acquire full, clear, consistent, connected and filtered management data.
·          give support to statistical intelligent mechanisms of learning to process massive management information and data.
·          Support easy, strong, reliable, secure and predictable network and service resource control.
·          support false-positive and negative free fault detection, diagnosis and network isolation and service resources.
·           support aware management collaboration of network and service.

Methodology Results:-
Mobility
·         Future Network has to support localization and optimization of the signaling and data paths.
·         Future Network also has to enable the network administrator to have control over signaling and data path.
·        Future network should have the capacity to locate the functional entities (e.g. mobility management) anywhere in the network (both in the access network and the mobile core).
·        Future network should have the capacity to provide the discovery function (network devices and resources) of the connected devices in both distributed and centralized fashions.
·        Future Networks should have the ability to connect devices that aren't fully capable of mobility and/or security without degradation of those features.
Mobility between virtualized networks
·        Future Network should have the capacity to support for the user to shift from one virtualized network (or LNP) to another.

Self-optimization Network
Then, Future Network doesn't only want flexibility of physical networks, it also needs flexibilities of logical networks because many network services are restricted by dependence of physical networks now. In case Future Networks has both flexibilities, several network properties will be distributed anywhere, anytime, everybody and everything to all of this network users (and more). To be aware of such a property distributions, Future Networks must have a functional partitioning of network properties user required in logical.
Future Networks might exceed or overcome the physical limit that includes such as capacity of optical fiber, electrical devices frequency and so on, by cooperated with technologies from devices level  ( optical and electrical) system level to network architecture level.
variable bandwidth and latency technology
NW resource cooperation technology
traffic centralized/distribution control technology
electrical/optical optimal function assignment
hardware/software optimal function assignment
data format/protocol conversion technology


Conclusion
 The significant part about any type of security is coming to know where the threat comes from.  If you don't know the threat, so how will you protect yourself?  So, it's a fact that being updated with the latest security flaws and vulnerabilities is a full time job that if you aren't doing, expect intruder to want to get into your network. Aretha technology is now true and could be placed where the network and software security industries are leading.


ليست هناك تعليقات:

إرسال تعليق

يتم التشغيل بواسطة Blogger.