Browse > Article

The Construction of Logical, Physical Network Separation by Virtualization  

Lee, YongHui (신성대학교 정보지원센터, 교양학부, 제철산업과)
Yoo, SeungJae (중부대학교 정보보호학과)
Publication Information
Abstract
With the development of information and communication, public institutions and enterprises utilize the business continuity using the Internet and Intranet. In this environment, public institutions and enterprises is to be introduced the number of solutions and appliances equipment to protect the risk of leakage of inside information. However, this is also the perfect external network connection is not enough to prevent leakage of information. To overcome these separate internal and external networks are needed. In this paper, we constructed the physical and logical network separation is applied to the network using the virtualization and thus the network configuration and network technical review of the various schemes were proposed for the separation.
Keywords
Virtualization; Logical network separation; Physical network separation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 이용희, 김현기. "국가기관 네트워크 망 분리 패러다임 변화에 관한 연구", 정보처리학회논문지:기술교육 제 6권 제 3호, pp. 209-216. 2011.12.
2 L. Peterson, S. Shenker, and J. Turner, "Overcoming the internet impasse through virtualization," in Proc. of 3rd ACM Workshop on Hot Topics in Networks, pp.1-6, November 15-16, 2004.
3 G. Schaffrath, C. Werle, P. Papadimitriou, A. Feldmann, R. Bless, A. Greenhalgh, and A.Wundsam, "Network virtualization architecture: proposal and initial prototype," in Proc. of 1st ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures, pp. 63-72,August 17-21, 2009.
4 N. M. K. Chowdhury and R. Boutaba, "A survey of network virtualization," Computer Networks, vol. 54, no. 5, pp. 862-876, April, 2010.   DOI   ScienceOn
5 Y. Che, Q. Yang, C. Wu and L. Ma,"BABAC: An access control framework for network virtualization using user behaviors and attributes," in Proc. of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, pp. 747-754, December 18-20, 2010.
6 Derek Bem, "Virtual Machine for Computer Forensics - the Open Source Perspective," Open Source Software for Digital Forensics, DOI 10.1007, pp. 25-42, Jan. 2010.
7 Greg Dorn, Chris Marberry, Scott Conrad, and Philip Craiger, "Analyzing the impact of a virtual machine on a hostmachine," International Federation for Information Processing, Advances in Digital Forensics V, IFIP AICT 306, DOI: 10.1007/978-3-642-04155-6_5, pp. 69-81, 2009.   DOI
8 Richard Arthur Bares, "Hiding in a Virtual World Using Unconventionally Installed Operating Systems," ISI 2009, pp. 276-284, Jun. 2009.