Loading

Improvement of Network Cyber Security Services using Security Operation Models
D Yaso Omkari1, J Omkar Reddy2, K Prathima Reddy3

1D Yaso Omkari, Assistant Professor, Dept. of CSE, Sri Venkateswara Engineering College, Tirupati, India.
2J Omkar Reddy, Assistant Professor, Dept. of CSE, Sri Venkateswara Engineering College, Tirupati, India.
3K Prathima Reddy, Assistant Professor, Dept. of CSE, Sri Venkateswara Engineering College, Tirupati, India. 

Manuscript received on April 02, 2020. | Revised Manuscript received on April 16, 2020. | Manuscript published on May 30, 2020. | PP: 254-261 | Volume-9 Issue-1, May 2020. | Retrieval Number: A1279059120/2020©BEIESP | DOI: 10.35940/ijrte.A1279.059120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Concerns for service computer networks’ security and reliability are growing rapidly due to increasing service devices with connections to external networks. This aggravates vulnerability of service networks to cyber attacks through external connections. Though encryption can provide security for user data transmissions, encryption itself could not provide protections against traffic analysis attacks. Techniques against traffic-analysis attacks through statistically controlling the transmission rate of padded and encrypted frames are unsuited for power system applications. This paper proposes three security operation modes for the newly developed security layer, located below DNP3 data-link layer, to strengthen encryption and authentication operations against the effectiveness of traffic analysis and cryptanalysis attacks. The security models use padding to disguise the amount of user data transmitted and disguise the user data link layer frame amongst a group of manufactured frames similar to statistically controlling data transmission rate. The proposed security operations have been successfully applied to enhance power system security controls.
Keywords: Computer networks, Computer network management, Computer network security, Power system communication, Power system security, Protocols, Security.
Scope of the Article: Network Security Trust, & Privacy