|
Applying Penetration Tests on a Highly Secured Cooperative NetworkKeywords: Network security , Virtual Local Area Networks , Virtual Private Network , Intrusion Detection System Abstract: Security plays a vital role in the design; development and practical use of the distributed computing environment,for greater availability and access to information in turn imply that distributed systems are more prone to attacks. The need forpractical solutions for secure networked system management is becoming increasingly significant. Any cooperative networkshould be supplied with different security techniques and tools. This paper deals with subjecting a highly secured cooperativenetwork to successive penetration tests. An experimental network is built to represent a typical layout for a cooperativenetwork and it is supplied with a variety of security techniques such as, Virtual Local Area Networks (VLAN), Virtual PrivateNetwork (VPN), Intrusion Detection System (IDS), Authentication, Authorization, and Accounting (AAA) server, Secure ShellHeader (SSH), Access Control List (ACL), WLAN security Techniques and Network Address Translation (NAT). Our testsfocus on the evaluation of the importance of each security technique and the effect of their absence on the security level of thenetwork. This work could assist the future introduction of security evaluation matrices.
|