Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach
T It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English English |
Published: |
IEEE
2020
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/84606/1/Published.pdf http://irep.iium.edu.my/84606/7/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_Scopus.pdf http://irep.iium.edu.my/84606/8/84606_Dealing%20With%20Well-Formed%20and%20Malformed%20Packets_WOS.pdf http://irep.iium.edu.my/84606/ https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9241700 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | T It is quite challenging to understand the weakest single points of failure in a network because it
is the point where an entire network system can be taken down. The paths leading to a point of failure, and the
status of packets that causes network security breaches were examined by Intent-Based Networking approach
in this study. Two algorithms are proposed, utilizing single-path and multipath in transmission flow. Every
path is potentially weak and a point of failure for which a network security can be breached. Two sets of rules,
namely, ‘‘vulnerability rules policies’’ with ‘‘rules formulation’’ from the regions of connection recognized
by Euler’s theorem were outlined. The intent is to use these sets of rules in finding the point of failure
the packet status that is leading to possible security breaches within network connections. The frequencies
of the packets that are liable to create security breaches and the paths where they originate are analyzed.
Well-formed packet originating from the least likely weak point of failure is associated the network security
breach than malformed packets. This study has contributed to revealing that network security breaches are
influenced by the paths with least likely point of failure from well-formed packets. |
---|