Loading…
Security Testing and Evaluation on Access Layer Network
This paper presents the deployment of the security testing and evaluation (ST&E), and classifications of common internal threats on a network access layer. Many kinds of research were conducted to find the best technique to test security on the network since the internal threats are the foremost...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This paper presents the deployment of the security testing and evaluation (ST&E), and classifications of common internal threats on a network access layer. Many kinds of research were conducted to find the best technique to test security on the network since the internal threats are the foremost in security breaches and hazardous of eligible insider user [6,7,8]. Therefore, this paper highlights two techniques to test the network security, especially on the very limited permission access in order to identify the characteristic of threats on the access layer network. The empirical studies result achieved by syslog and (Switched Port Analyzer) SPAN protocol configuration technique. It is demonstrated that the attack can be done on the access layer. The findings on vulnerability testing also found that the severity of security threat on the network requires further action. The results which are studied will help the administrator to plan the mitigation of security threats on the access layer network. |
---|---|
ISSN: | 2470-640X |
DOI: | 10.1109/ICSEngT.2018.8606394 |