TY - GEN
T1 - An adaptive cross-layer design approach for network security management
AU - Chuang, I. Hsun
AU - Hsieh, Chou Ting
AU - Kuo, Yau Hwang
PY - 2011
Y1 - 2011
N2 - In traditional Open Systems Interconnection (OSI) layered model, many security protocols in layers are proposed to provide network security. Because security protocols among layers are lack of cooperation, system performance degrades due to security redundancy and furthermore causes system overloading. Therefore, the paper proposes a cross-layer design network security management (CLDNSM) to protect system security while improve system performance, such as CPU utilization. First, the multiple security-dimension quantification (MSDQ) metric is proposed to evaluate holistic system security. Then, the proposed CLDNSM aggregates system information from layers and uses it to obtain the optimal security settings of layers according to the MSDQ metric. The simulation results show that system performance will be improved without sacrificing security protect compared to OSI layered model by using CLDNSM. Finally, to adapt to dynamic environments, security constraints will be modified automatically in a limited range to avoid system overloads, the simulation results show that the system overloads are under control
AB - In traditional Open Systems Interconnection (OSI) layered model, many security protocols in layers are proposed to provide network security. Because security protocols among layers are lack of cooperation, system performance degrades due to security redundancy and furthermore causes system overloading. Therefore, the paper proposes a cross-layer design network security management (CLDNSM) to protect system security while improve system performance, such as CPU utilization. First, the multiple security-dimension quantification (MSDQ) metric is proposed to evaluate holistic system security. Then, the proposed CLDNSM aggregates system information from layers and uses it to obtain the optimal security settings of layers according to the MSDQ metric. The simulation results show that system performance will be improved without sacrificing security protect compared to OSI layered model by using CLDNSM. Finally, to adapt to dynamic environments, security constraints will be modified automatically in a limited range to avoid system overloads, the simulation results show that the system overloads are under control
UR - http://www.scopus.com/inward/record.url?scp=79955695780&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79955695780&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:79955695780
SN - 9788955191554
T3 - International Conference on Advanced Communication Technology, ICACT
SP - 1085
EP - 1089
BT - 13th International Conference on Advanced Communication Technology
T2 - 13th International Conference on Advanced Communication Technology: Smart Service Innovation through Mobile Interactivity, ICACT 2011
Y2 - 13 February 2011 through 16 February 2011
ER -