University of Bahrain
Scientific Journals

Build a Secure Network using Segmentation and Micro-segmentation Techniques

Show simple item record

dc.contributor.author A. Al-Ofeishat, Hussein
dc.contributor.author Alshorman, Rafat
dc.date.accessioned 2023-10-12T15:44:10Z
dc.date.available 2023-10-12T15:44:10Z
dc.date.issued 2023-09-20
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5237
dc.description.abstract Due to the increasing number of threats and attacks that threaten the network during the recent years, novel methods and techniques have been improved to secure the infrastructure of the network and the data transmitted within it. Micro-segmentation and segmentation techniques are popularly used over computer networks to reduce the defensive versus cyberattack. These techniques aim to minimize the damage obtained from attackers by segmenting the network into many clusters or sections and limiting the communications among them. Thus, each cluster or segment within the network becomes isolated from the others and this will increase the security of highly sensitive data networks and prevent unauthorized people and attackers from reaching to these sensitive data. In this paper, the micro-segmentation and segmentation techniques have been studied. Further, two scenarios of the implementation of micro-segmentation and segmentation within networks have been studied. Then, an enhanced scenario has been suggested to overcome the limitations of those two scenarios. The suggested scenario integrates NSX-T micro-segmentation with Sky API and policy enforcer to enhance the security and the performance of the network. After that, a comparison between all scenarios has been achieved to show which one is the best. en_US
dc.language.iso en en_US
dc.publisher University Of Bahrain en_US
dc.subject Micro-segmentation en_US
dc.subject Segmentation en_US
dc.subject cyberattack en_US
dc.subject Clusters en_US
dc.subject Security en_US
dc.subject Attackers en_US
dc.subject NSX-T en_US
dc.subject Sky API en_US
dc.subject policy enforcer en_US
dc.title Build a Secure Network using Segmentation and Micro-segmentation Techniques en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/XXXXXX
dc.volume 14 en_US
dc.issue 1 en_US
dc.pagestart 1 en_US
dc.pageend 16 en_US
dc.contributor.authorcountry Jordan en_US
dc.contributor.authoraffiliation Computer Engineering Department, Al-Balqa Applied University, Salt en_US
dc.contributor.authoraffiliation Computer science Department, Yarmouk University, Irbid en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account