A secure architecture framework for defensive network

Document Type : Original Article

Authors

1 Ph.D. in Technology and Information of Malek Ashtar University of Technology

2 Associate Professor of Technology and Information of Malek Ashtar University of Technology

Abstract

Information and communication technology has a direct
impact on all levels of any organization. Network-centric defense in a safe
environment is one of the recent technology which makes up the majority of
defense organizations to accept these networks or to deploy their systems in
these environments. Defense is one of the nation's critical infrastructure and
by deploying it in network-centric environment, the terms such as efficiency,
innovation and agility should be increased.
Despite all the benefits, the issue of security as
the most important challenge in this environment is necessary. This study
evaluated a secure central network architecture requirement for defense
organizations.

The population used in this
study consist of professors and students of PhD in the field of cyberspace
security, cyber strategic management and technology experts were in the arm
forces.
The results show that for
upgrade defense technology in organizations, a model of security architecture
for accommodate defense and exploited networks should be developed.
Also security in the
architecture is a critical requirement.
In the architecture provided, the different
components of network security defense is examined

Keywords


-    نقیان فشارکی، مهدی، "ارائهمعماریمرجعامنیتیمحیطرایانشابرخصوصیسازمان"، فصلنامه علمی- پژوهشی امنیت پژوهی، (1393).
-    ولوی، محمدرضا، (1394)، "ارائه الگوی امن استقرار زیرساخت‌های دفاعی کشور در محیط رایانش ابری"، فصلنامه علمی پژوهشی مطالعات بین‌رشته‌ای راهبردی، دانشگاه عالی دفاع ملی، تهران.
-   Arifeen, F. U., Siddiqui, R. A., Ashraf, S., & Waheed, S. (2015). "Inter-Cloud Authentication through X. 509 for defense organization". Paper presented at the 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
-   B., Wong, R. K., Ghanavati, M., & Chi, C. H. (2014). "Privacy as a service in social network communications". Paper presented at the Services Computing (SCC), 2014 IEEE International Conference on.
-   Chung, C.-J., Xing, T., Huang, D., Medhi, D., & Trivedi, K. (2015). "SeReNe: on establishing secure and resilient networking services for an SDN-based multi-tenant datacenter environment". Paper presented at the 2015 IEEE International Conference on Dependable Systems and Networks Workshops.
-   D. Sun, G. Chang, L. Sun, X. Wang, (2011), “Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments”, Procedia Engineering, vol. 15, 2852-2856.
-   Karabacak, B., Yildirim, S. O., & Baykal, N. (2016). "Regulatory approaches for cyber security of critical infrastructures: The case of Turkey". Computer Law & Security Review, 32(3), 526-539.
-   Hardman, O., Groat, S., Marchany, R., & Tront, J. (2013). "Optimizing a network layer moving target defense for specific system architectures". Paper presented at the Proceedings of the ninth ACM/IEEE Symposium on Architectures for Networking and Communications Systems.
-   Joshi, B. K., Shrivastava, M. K., & Joshi, B. (2016). "Security Threats and Their Mitigation in Infrastructure as a Service". Perspectives in Science.
-   Li, J., Feng, Z., Feng, Z., & Zhang, P. (2015). "A survey of security issues in cognitive radio networks". China Communications, 12(3), 132-150