Robust Network Security Infrastructural Model for Real-time Big Data Centres
Abstract
Keywords
Full Text:
PDFReferences
Smith, K. (2020). Insider Threats: Reducing the Risk in Data Centers. Data Center Knowledge. [Link](https://www.datacenterknowledge.com/security/insider-threats-reducing-risk-data-centers)
Cisco. (2021). Building Cybersecurity Resilience in the Data Center. [Link](https://www.cisco.com/c/en/us/solutions/data-center/building-cybersecurity-resilience-in-data-center.html)
Data Center: Infrastructure Architecture SRND, URL: http://www.cisco.com/application/ pdf /en /us /guest/netsol/ns304/c649/cdccont_0900aecd800e4d2e.pdf
Data Center: Securing Server Farms , URL: ww.cisco.com/application/pdf/en/us/ guest/ netsol/ ns304/c649/ccmigration_09186a008014edf3.pdf
Mitchell Rowton," Introduction to Network Security - Intrusion Detection", February 2005, URL: http:// www.securitydocs.com/library/3009
Mathew Tanase, " IP Spoofing: An Introduction",
Chuvakin, A., & Schneider, J. (2021). Intrusion Detection and Prevention Systems. Springer.
Porras, P. A., Neumann, P. G., & Valdes, A. (2013). A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. ACM Computing Surveys, 45(1), 1-39. [Link](https://dl.acm.org/doi/10.1145/2510098)
A. Greenberg, J. Hamilton, D.A. Maltz, P. Patel. The cost of a cloud: research problems in data center networks. SIGCOMM Comput. Commun. Rev., 39 (1) (2008), pp. 68-73
A. Greenberg, J.R. Hamilton, N. Jain, S. Kandula, Kim C., P. Lahiri, D.A. Maltz, P. Patel, S. Sengupta. VL2: a scalable and flexible data center network. Proceedings of ACM SIGCOMM’09 (2009), pp. 51-62
Smith, A., Johnson, B., & Williams, C. (2020). Machine learning-enhanced intrusion detection for hybrid network security models. Journal of Cybersecurity, 5(2), tyaa012.
Yang, L., Liu, X., & Li, Z. (2018). Integrating software-defined networking with traditional firewalls for hybrid network security. IEEE Transactions on Network and Service Management, 15(1), 45-54.
Chen, J., Zhang, J., & Wang, J. (2019). Contextual adaptive access control for hybrid network security models. *IEEE Transactions on Dependable and Secure Computing, 18(2), 524-537.
Zhang, H., Wang, Y., & Li, Q. (2017). Hybrid data protection using encryption and tokenization in storage systems. IEEE Transactions on Information Forensics and Security, 12(11), 2731-2744.
Brown, T., Davis, N., & Smith, P. (2016). Collaborative threat intelligence integration in hybrid security models. International Journal of Information Security, 15(6), 549-560.
Smith, D. (2019). The Advantages and Disadvantages of Using Firewalls. Techwalla. [Online]. Available: https://www.techwalla.com/articles/advantages-disadvantages-using-firewalls
VMware. (2023). What is Micro-Segmentation? VMware. [Online]. Available: https://www.vmware.com/topics/glossary/content/micro-segmentation
NIST. (2023). Zero Trust Architecture. NIST Cybersecurity Insights. [Online]. Available: https://www.nist.gov/programs-projects/zero-trust-architecture
Chen, G., Chandola, V., & Xiang, Y. (2012). Predicting Network Anomalies with Painless. ACM Transactions on Knowledge Discovery from Data (TKDD), 6(1), 1-29.
DOI: http://dx.doi.org/10.52155/ijpsat.v48.1.6870
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Engr. Dr. OKORIE Emeka, Assoc. Prof. ILOKA Bertram .C.
This work is licensed under a Creative Commons Attribution 4.0 International License.