CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Network Security Analysis in the Enterprise LANS

by Leonard L. Mutembei, Aloys N. Mvuma, Tabu S. Kondo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 101 - Number 13
Year of Publication: 2014
Authors: Leonard L. Mutembei, Aloys N. Mvuma, Tabu S. Kondo
10.5120/17751-8837

Leonard L. Mutembei, Aloys N. Mvuma, Tabu S. Kondo . Network Security Analysis in the Enterprise LANS. International Journal of Computer Applications. 101, 13 ( September 2014), 37-42. DOI=10.5120/17751-8837

@article{ 10.5120/17751-8837,
author = { Leonard L. Mutembei, Aloys N. Mvuma, Tabu S. Kondo },
title = { Network Security Analysis in the Enterprise LANS },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 101 },
number = { 13 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume101/number13/17751-8837/ },
doi = { 10.5120/17751-8837 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:31:37.153606+05:30
%A Leonard L. Mutembei
%A Aloys N. Mvuma
%A Tabu S. Kondo
%T Network Security Analysis in the Enterprise LANS
%J International Journal of Computer Applications
%@ 0975-8887
%V 101
%N 13
%P 37-42
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Enterprise Local Area Networks (ELANs) have been expanding following an increase in the number of staff which necessitates establishment of new offices. However, reliability and security of services provided by ELANs need to be ensured at all times to meet expectations of users. In this paper, the network security holes existing within the ELANs were investigated. Vulnerabilities and threats were critically examined in one of the ELANs. It was observed that known vulnerabilities were still around within the network. Based on the findings, the paper suggests that all software used in the networking devices need to be updated; unneeded open ports need to be closed; cache servers and security policy need to be implemented. The suggestions will ensure stability of the network during scaling out as the number of staff continues to grow.

References
  1. Internet World Stats, 2011. "World Internet Users and Population Stats", [http://www. internetworldstats. com/stats. htm], site visited on August 28, 2013.
  2. TCRA, 2010. "Report on Internet and Data Service in Tanzania" [http://www. tcra. go. tz/publications/InternetDataSurveryScd. pdf], site visited on 23, January 2012.
  3. Internet Systems Consortium, 2011. "Internet Domain Survey, July 2011", [ftp. isc. org/www/survey/reports/2011/07/], site visited on September 10, 2013.
  4. Cornwall, H. 1985. The hacker's handbook, Century Communications Ltd, Portland House, 12-13 Greek Street, London W1V 5LE.
  5. Whittaker, Z. 2010. "Virus attack Hits Vista machines, cripples university network", [http://www. zdnet. com/blog/igeneration/virus-attack-hits-vista-machines-cripples-university-network/3954], site visited on March 25, 2012.
  6. Alabady, S. 2009. "Design and Implementation of a Network Security Model For Cooperative Network," International Arab Journal of e-Technology, Vol. 1, No. 2.
  7. http://www. sans. org/network_security. php, site visited on October 10, 2013.
  8. Daya, B. 2011. "Network Security: History, Importance, and Future", [http://web. mit. edu/~bdaya/www/Network%20Security. pdf], site visited on February 19, 2012.
  9. ICT Headquarters, 2012. "Networking", [http://icthq. org/network-security], site visited on January 20, 2012.
  10. Dowd, P. W. and McHenry, J. T. 1998. "Network Security: It's Time to Take It Seriously", Computer, vol. 31, no. 9, pp. 24-28.
  11. http://www. wisegeek. com/what-is-network-security-analysis. htm, site visited on October 10, 2013.
  12. Vulnerability scanning with SAINT scanner, [http://www. saintcorporation. com /solutions/vulnerabilityScan. html], site visited on March 28, 2012.
  13. Vacca, J. R. 2010. Network and System Security, Syngress
  14. Bacudio, G. A. , Yuan, X. , Chu, B. B. and Jones, M. 2011. "An overview of penetration testing", International Journal of Network Security & Its Application (IJNSA), Vol. 3, No. 6.
  15. Tilak, P. 2011. "Technical White Paper on Penetration Testing", [http://www. docstoc. com/docs/70280500/White-Paper-on-Penetration-Testing], site visited on July 17, 2012.
  16. BackTrack, [http://www. backtrack-linux. org/], site visited on February 5, 2012.
  17. TENABLE Network Security, "Nessus 5", [http://www. nessus. org/products/nessus], site visited on June 10, 2012.
  18. Nmap, [http://nmap. org/zenmap/], site visited on February 5, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Network security analysis Network Security Network Vulnerability