Robust Network Security Infrastructural Model for Real-time Big Data Centres

Engr. Dr. OKORIE Emeka, Assoc. Prof. ILOKA Bertram .C.

Abstract


Data centers play a pivotal role in modern information technology infrastructure, hosting a vast amount of critical data and services. However, the growing complexity of cyber threats demands innovative and adaptable security measures. This paper explores the concept of hybrid network security models for data centers, which combine the strengths of multiple security approaches to provide comprehensive protection. We delve into the key components of these models, including perimeter security, micro-segmentation, intrusion detection systems, and behavioral analytics. By incorporating both traditional and cutting-edge security techniques, hybrid models enhance threat detection, response times, and overall network resilience. This article presents a comprehensive analysis of various hybrid network security approaches, offering insights into their benefits, challenges, and real-world implementations. It emphasizes the need for continuous monitoring, dynamic adaptation, and collaboration among security components to counter ever-evolving threats.

Keywords


Robust Network, Security, Infrastructural Model, Real-time Big Data Centres.

Full Text:

PDF

References


Smith, K. (2020). Insider Threats: Reducing the Risk in Data Centers. Data Center Knowledge. [Link](https://www.datacenterknowledge.com/security/insider-threats-reducing-risk-data-centers)

Cisco. (2021). Building Cybersecurity Resilience in the Data Center. [Link](https://www.cisco.com/c/en/us/solutions/data-center/building-cybersecurity-resilience-in-data-center.html)

Data Center: Infrastructure Architecture SRND, URL: http://www.cisco.com/application/ pdf /en /us /guest/netsol/ns304/c649/cdccont_0900aecd800e4d2e.pdf

Data Center: Securing Server Farms , URL: ww.cisco.com/application/pdf/en/us/ guest/ netsol/ ns304/c649/ccmigration_09186a008014edf3.pdf

Mitchell Rowton," Introduction to Network Security - Intrusion Detection", February 2005, URL: http:// www.securitydocs.com/library/3009

Mathew Tanase, " IP Spoofing: An Introduction",

Chuvakin, A., & Schneider, J. (2021). Intrusion Detection and Prevention Systems. Springer.

Porras, P. A., Neumann, P. G., & Valdes, A. (2013). A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. ACM Computing Surveys, 45(1), 1-39. [Link](https://dl.acm.org/doi/10.1145/2510098)

A. Greenberg, J. Hamilton, D.A. Maltz, P. Patel. The cost of a cloud: research problems in data center networks. SIGCOMM Comput. Commun. Rev., 39 (1) (2008), pp. 68-73

A. Greenberg, J.R. Hamilton, N. Jain, S. Kandula, Kim C., P. Lahiri, D.A. Maltz, P. Patel, S. Sengupta. VL2: a scalable and flexible data center network. Proceedings of ACM SIGCOMM’09 (2009), pp. 51-62

Smith, A., Johnson, B., & Williams, C. (2020). Machine learning-enhanced intrusion detection for hybrid network security models. Journal of Cybersecurity, 5(2), tyaa012.

Yang, L., Liu, X., & Li, Z. (2018). Integrating software-defined networking with traditional firewalls for hybrid network security. IEEE Transactions on Network and Service Management, 15(1), 45-54.

Chen, J., Zhang, J., & Wang, J. (2019). Contextual adaptive access control for hybrid network security models. *IEEE Transactions on Dependable and Secure Computing, 18(2), 524-537.

Zhang, H., Wang, Y., & Li, Q. (2017). Hybrid data protection using encryption and tokenization in storage systems. IEEE Transactions on Information Forensics and Security, 12(11), 2731-2744.

Brown, T., Davis, N., & Smith, P. (2016). Collaborative threat intelligence integration in hybrid security models. International Journal of Information Security, 15(6), 549-560.

Smith, D. (2019). The Advantages and Disadvantages of Using Firewalls. Techwalla. [Online]. Available: https://www.techwalla.com/articles/advantages-disadvantages-using-firewalls

VMware. (2023). What is Micro-Segmentation? VMware. [Online]. Available: https://www.vmware.com/topics/glossary/content/micro-segmentation

NIST. (2023). Zero Trust Architecture. NIST Cybersecurity Insights. [Online]. Available: https://www.nist.gov/programs-projects/zero-trust-architecture

Chen, G., Chandola, V., & Xiang, Y. (2012). Predicting Network Anomalies with Painless. ACM Transactions on Knowledge Discovery from Data (TKDD), 6(1), 1-29.




DOI: http://dx.doi.org/10.52155/ijpsat.v48.1.6870

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Engr. Dr. OKORIE Emeka, Assoc. Prof. ILOKA Bertram .C.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.