International Journal of Communications, Network and System Sciences

Volume 5, Issue 5 (May 2012)

ISSN Print: 1913-3715   ISSN Online: 1913-3723

Google-based Impact Factor: 0.66  Citations  h5-index & Ranking

Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic

HTML  Download Download as PDF (Size: 364KB)  PP. 245-252  
DOI: 10.4236/ijcns.2012.55033    4,920 Downloads   7,209 Views  Citations

ABSTRACT

Securing large corporate communication networks has become an increasingly difficult task. Sensitive information routinely leaves the company network boundaries and falls into the hands of unauthorized users. New techniques are required in order to classify packets based on user identity in addition to the traditional source and destination host addresses. This paper introduces Gaussian cryptographic techniques and protocols to assist network administrators in the complex task of identifying the originators of data packets on a network and more easily policing their behavior. The paper provides numerical examples that illustrate certain basic ideas.

Share and Cite:

B. S. Verkhovsky and R. D. Rubino, "Corporate Intranet Security: Packet-Level Protocols for Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic," International Journal of Communications, Network and System Sciences, Vol. 5 No. 5, 2012, pp. 245-252. doi: 10.4236/ijcns.2012.55033.

Cited by

[1] Integer Algorithms in Cryptology and Information Assurance
World Scientific Publishing, 2015
[2] Large-Integer Multiplication Based on Homogeneous Polynomials
Int'l J. of Communications, Network and System Sciences, 2012

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.