Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

Author:

Waheed Faisal1,Ali Maaruf2ORCID

Affiliation:

1. BT Media and Broadcast, UK

2. University of Suffolk, UK

Abstract

Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System). Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS), attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step-by-step hardening approach is adopted to secure the proposed network framework’s border router. Encrypted services coupled with best practice configurations are implemented and tested in an emulated environment. The use of protocol analysers, CISCO Configuration Professional’s Audit and penetration testing tools corroborated the success of the project.

Publisher

International Association for Educators and Researchers (IAER)

Subject

Electrical and Electronic Engineering,General Computer Science

Reference29 articles.

1. Doyle, J., 1998. CCIE Professional Development. Routing TCP/IP, [Online]. 1, 2. Available at: http://www.CISCOpress.com/series.cfm?series=2&subseries=17&news=0 [Accessed: 30th Nov., 2015].

2. Lammle, T., 2013. CCNA Routing and Switching Study Guide. 5th ed. Indiana: John and Wiley Sons, Inc.

3. Behrouz A. Forouzan, 2010. TCP/IP Protocol Suite. 4th revised edition. McGraw-Hill Medical Publishing.

4. Small Biz trends, (2010), OSI media layer. Available: http://smallbiztrends.com/wp-content/uploads/2013/09/osi-model-557x454.gif [Accessed: 12th Jan., 2016].

5. Baker, K., 2014. CCNA Security 640-554 Official Cert Guide. 3rd ed. Indianapolis, USA: CISCO press.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. The Deep Review of PRA in Online Platform;2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE);2024-05-14

2. The Estimation of PR Method with the use of LV of Web Pages;2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE);2024-05-14

3. Comparative Analysis of Ranking Algorithms Used On Web;Annals of Emerging Technologies in Computing;2020-04-01

4. Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation;Annals of Emerging Technologies in Computing;2018-10-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3