Friday 3rd of May 2024
 

Network Security Using Job Oriented Architecture (SUJOA)


Tariq Ahamad and Abdullah Aljumah

ABSTRACT In the modern world operating system, various security systems (Collection of various security components) are already installed or can be directly installed in it. They are responsible for checking the complete node for suspicious behaviour. There are some intrusions having the ability to hide themselves from being checked called armouring intrusions. In this research article we present alternative organisation of security systems. To distinguish operating system applications and security systems, the node is completely virtualized with current virtualized systems. The node is then checked by security systems from outside and the right security components are provided through job oriented architecture. Since they run on a virtual machine the infected nodes can be halted, duplicated and moved to other nodes for further analysis and legal aspects. The coordinated architecture analysed in this research article and the results of a preliminary implementation with positive results are discussed.

Keywords: Network Security, Network Security Architecture

Download Full-Text


ABOUT THE AUTHORS

Tariq Ahamad
College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA

Abdullah Aljumah
College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »