IJETMS LANDING PAGE

International Journal of Engineering Technology and Management Sciences

2023, Volume 7 Issue 1

The Network Management Appliance

AUTHOR(S)

Dr.Koshidgewar Bhasker G

DOI: https://doi.org/10.46647/ijetms.2023.v07i01.054

ABSTRACT
Network and computer systems have become a critical asset to all organizations. These complex networks must connect several different hardware, software and data platforms seamlessly. This complexity makes it difficult to reliably manage and secure the network and its attached systems while maintaining availability to authorized users. Traditional approaches including the use of VLANs, ACLs, firewalls, and proxies are complicated and make it hard to maintain consistent control across the enterprise. Several tools have been developed to help administrators audit and configure these devices. Despite these efforts, networks still remain unsecure and difficult to manage. This paper looks at a radical new centralized approach to network management called Ethane. Ethane provides direct control over the policy for the entire network by exploiting the capabilities of dumb switches connected to a central controller. An easily readable policy language allows network rules to be explicitly defined. Once we describe how the transport layer is secured, we'll look at how Ethane can be combined with virtualization techniques to provide a thorough defense through all system layers. The system not only blocks malicious traffic, it allows users and administrators to view the system as an organizational appliance.

Page No: 356 - 360

References:

  1. M. Subramanian, Network management Principles and Practice. Boston: Addison Wesley, 2006, pp. 35-36.
  2. J Leyden, "Security  spending  soars." The Register [Online] October 11, 2007. [Cited: March 20, 2010] http://www.theregister.co.uk/2007/10/11/comptia_security_survey/.
  3. U.S. Department of Defense, "Cybersecurity Seizes More Attention, Budget Dollars." in Defence Talk.[Online] February 8, 2010. [Cited: March 23, 2010.] http://www.defencetalk.com/network-security-budget-dollars-24057/.
  4. M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, "Ethane: Taking control of the enterprise," in Proc. SIGCOMM, Kyoto, Japan, Aug. 2007, pp. 1-12.
  5. M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, 2009. Rethinking enterprise network control. IEEE/ACM Trans. Netw. 17, 4 (Aug. 2009), 1270-1283..
  6. A. Wool, “A quantitative study of firewall configuration errors,” Computer, vol. 37, no. 6, pp. 62–67, 2004.
  7. G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg, and G. Hjalmtysson, “Routing design in operational networks: A look from the inside,” in Proc. SIGCOMM, Sep. 2004, pp. 27–40.
  8. D. Caldwell, A. Gilbert, J. Gottlieb, A. Greenberg, G. Hjalmtysson, and J. Rexford, “The cutting edge of IP router configuration,” Comput. Commun. Rev., vol. 34, no. 1, pp. 21–26, 2004.
  9. A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang, “A clean slate 4D approach to network control and management,” Comput. Commun. Rev., vol. 35, no. 5, pp. 41–54, Oct. 2005.M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.
  10. M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker, “SANE: A protection architecture for enterprise networks,” in Proc. USENIX Security Symp., Aug. 2006, vol. 15, Article No. 10.

How to Cite This Article:
Dr.Koshidgewar Bhasker G . The Network Management Appliance . ijetms;7(1):356-360. DOI: 10.46647/ijetms.2023.v07i01.054