Information Security: Proposal for a VLAN Network Model

Information Security: Proposal for a VLAN Network Model

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-4
Year of Publication : 2023
Author : Carmen Liliana Rodas Cortijo, Daniel Llallahue Callañaupa, Laberiano Andrade-Arenas, Michael Cabanillas-Carbonell
DOI : 10.14445/22315381/IJETT-V71I4P204

How to Cite?

Carmen Liliana Rodas Cortijo, Daniel Llallahue Callañaupa, Laberiano Andrade-Arenas, Michael Cabanillas-Carbonell, "Information Security: Proposal for a VLAN Network Model," International Journal of Engineering Trends and Technology, vol. 71, no. 4, pp. 29-46, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I4P204

Abstract
This article consists of the implementation of a VLAN network in the Hospital Central FAP. The objective is to increase information security, as well as to improve and optimize user data, and this is achieved through the development and use of different protocols, restrictions, and methods that helped to achieve this purpose. Likewise, the article uses the Top-down methodology, which has phases focused on analyzing, developing, and improving the different processes for designing and implementing a VLAN network topology. As a technique, an interview was conducted with the person who, through a series of questions, expressed their opinion on the hospital's problems under study. Data processing was carried out at a qualitative level using Atlas Ti22 software, which allowed the analysis of the perception of 6 people with direct knowledge of the hospital's problems. This information was used to obtain the data for the research work. The result was a high degree of deficiency and disagreement with the system they are currently using. They explained that their data were violated, generating concern among users and all the staff. In addition, the conclusion obtained was that in view of the existing problems, the experts indicated that the proposal related to the implementation of a VLAN Network would meet the desired expectations, providing security to the information, so they consider it a feasible and appropriate option that would be a great alternative for the improvement of the hospital.

Keywords
Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM.

References
[1] Shamimul Islam et al., "Threat Minimization by Design and Deployment of Secured Networking Model," International Journal of Electronics and Information Engineering, vol. 8, no. 2, pp. 135-144, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Fairriky Rynjah, Bronson Syiem, and L. Joyprakash Singh, "Investigating Khasi Speech Recognition Systems using a Recurrent Neural Network-Based Language Model," International Journal of Engineering Trends and Technology, vol. 70, no. 7, pp. 269–274, 2022.
[CrossRef] [Publisher Link]
[3] Tareq Al-Khraishi, and Muhannad Quwaider, "Performance Evaluation and Enhancement of VLAN Via Wireless Networks Using OPNET Modeler," International Journal of Wireless & Mobile Networks, vol. 12, no. 3, pp. 15–30, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Madjed Bencheikh Lehocine, and Mohamed Batouche, "Flexibility of Managing VLAN Filtering and Segmentation in SDN Networks," 2017 International Symposium on Networks, Computers and Communications, ISNCC 2017, pp. 1-6, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Ahmed Y. Mahmoud, "A Novel Hash Functions for Data Integrity Based on Affine Hill Cipher and Tensor Product," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 1-9, 2022.
[CrossRef] [Publisher Link]
[6] Holden Gordon et al., "Securing Smart Homes Via Software-Defined Networking and Low-Cost Traffic Classification," Proceedings - 2021 IEEE 45th Annual Computers, Software, and Applications Conference, COMPSAC 2021, pp. 1049–1057, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] P. Sindhu, and G. Indirani, "Equilibrium Optimizer with Deep Convolutional Neural Network-based Squeeze Net Model for Grape Leaf Disease Classification in IoT Environment," International Journal of Engineering Trends and Technology, vol. 70, no. 5, pp. 94–102, 2022.
[CrossRef] [Publisher Link]
[8] Ricardo Flores Moyano et al., "NFV-based QoS Provision for Software Defined Optical Access and Residential Networks," 2017 IEEE/ACM 25th International Symposium on Quality of Service, IWQoS 2017, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Sesha Kethineni, "Cybercrime in India: Laws, Regulations, and Enforcement Mechanisms," The Palgrave Handbook of International Cybercrime and Cyberdeviance, pp. 305–326, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Swetha Gadde, J. Amutharaj, and S. Usha, "A Hybrid Cryptography Technique for Cloud Data Security," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 258-267, 2022.
[CrossRef] [Publisher Link]
[11] Kumaresh Sheelavant, R. Sumathi, and Charan K V, "Optimal Routing and Scheduling for Cognitive Radio Sensor Networks Using Ensemble Multi Probabilistic Optimization and Truncated Energy Flow Classification Model," International of Engineering Trends and Technology, vol. 69, no. 9, pp. 168–178, 2021.
[CrossRef] [Publisher Link]
[12] Dhurgham Abdulridha Jawad, and AL-Khaffaf, “Improving LAN Performance Based on IEEE802.1Q VLAN Switching Techniques,” Journal of University of Babylon for Engineering Sciences, vol. 26, no. 1, pp. 286–297, 2018.
[Google Scholar] [Publisher Link]
[13] M. Ogar-Abang, G. A. Fischer, and E. J. Akpama, "Evaluation of Network Performance for Single VLAN and Six VLANS Network," 2nd International Conference on Electrical Power Engineering, pp. 20-24, 2021.
[Google Scholar]
[14] Neha Priya, "Cybersecurity Considerations for Industrial IoT in Critical Infrastructure Sector," International Journal of Computer and Organization Trends, vol. 12, no. 1, pp. 27-36, 2022.
[CrossRef] [Publisher Link]
[15] Antonio Francesco Gentile, Peppino Fazio, and Giuseppe Miceli, "A Survey on the Implementation and Management of Secure Virtual Private Networks (VPNs) and Virtual LANs (VLANs) in Static and Mobile Scenarios," Telecom 2021, vol. 2, no. 4, pp. 430–445, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] J. A. Figueroa-Suárez et al., “Computer Security and Information Security,” Pole of Knowledge, vol. 2, no. 12, pp. 145–155, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Ammar. O.Hasan et al., "A Simulation of Wireless Computer Network Salahaddin University Campus of FTP Using OPNET Simulator," 2017.
[Google Scholar]
[18] Nelly Victoria Ley Leyva et al., "Effectiveness and efficiency of LAN network security. Cantón Pasaje,” Society & Technology, vol. 4, no. 2, pp. 205–222, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Vencelin Gino V, and Amit KR Ghosh, "Enhancing Cyber Security Measures for Online Learning Platforms," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 11, pp. 1-5, 2021.
[CrossRef] [Publisher Link]
[20] Tareq Al-Khraishi, and Muhannad Quwaider, "Implementation of VLAN via Wireless Networks Using Opnet Modeler," Computer Science & Information Technology, pp. 57–72, 2019.
[CrossRef] [Google Scholar]
[21] Chen Liang et al., "Research on Neural Network Chaotic Encryption Algorithm in Wireless Network Security Communication," EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 1, pp. 1–10, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Bruno Carneiro da Rocha et al., "Preventing APT Attacks on LAN Networks with Connected Iot Devices Using a Zero Trust Based Security Model," 2021 Workshop on Communication Networks and Power Systems, WCNPS 2021, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Muhamad Fahri, "Simulation of a Virtual Local Area Network (VLAN) Network Using a POX Controller," Faculty of Science and Technology Syarif Hidayatullah State Islamic University Jakarta, 2017.
[Publisher Link]
[24] Marcio Silva Cruz, Ferrucio de Franco Rosa, and Mario Jino, “A Study on Ontologies of Vulnerabilities and Attacks on VLAN,” Advances in Intelligent Systems and Computing, pp. 115–119, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Sivathas P, "Emerging Information Technology in Indian Banking Sector and its Cyber Security," SSRG International Journal of Economics and Management Studies, vol. 5, no. 2, pp. 16-22, 2018.
[CrossRef] [Publisher Link]
[26] Astika Ayuningtyas, Sudaryanto Sudaryanto, and Deno Daseftra Cessara, “Virtual Local Area Network (VLAN) Management System on Web-Based Cisco Catalyst 3750,” Symmetris: Journal of Mechanical Engineering, Electrical and Computer Science, vol. 11, no. 1, pp. 297–306, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Māris Jurušs, Baiba Šmite-Roķe, and Līga Gasūne, "Excise Duty Gap on Cigarettes," Engineering Economics, vol. 29, no. 4, pp. 419–423, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Namra Abid et al., "Synthesis of Nanomaterials Using Various Top-Down and Bottom-Up Approaches, Influencing Factors, Advantages, and Disadvantages: A Review," Advances in Colloid and Interface Science, vol. 300, p. 102597, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[29] V.Usha Bala, and B.D.C.N.Prasad, "Steering the Enterprise's Information System Security Risks in Relation with Uncertainty (Information System, Risks)," SSRG International Journal of Computer Science and Engineering, vol. 5, no. 2, pp. 5-8, 2018.
[CrossRef] [Publisher Link]
[30] David C. Wynn, and P. John Clarkson, "Process Models in Design and Development," Research in Engineering Design, vol. 29, no. 2, pp. 161–202, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[31] I.Lakshmi, "A Review on Security in Mobile Cloud Computing," SSRG International Journal of Mobile Computing and Application, vol. 6, no. 2, pp. 4-11, 2019.
[CrossRef] [Publisher Link]
[32] Annika E. Nilsson et al., "Towards Extended Shared Socioeconomic Pathways: A Combined Participatory Bottom-Up and Top-Down Methodology with Results from the Barents Region," Global Environmental Change, vol. 45, pp. 124–132, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Igor Saenko, and Igor Kotenko, "A Role-Base Approach and a Genetic Algorithm for VLAN Design in Large Critical Infrastructures," Proceedings of the Genetic and Evolutionary Computation Conference Companion, pp. 1643-1650, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Tianjiao Chen et al., "Virtual Network Embedding Algorithm for Location-Based Identifier Allocation," IEEE Access, vol. 7, pp. 31159–31169, 2019.
[CrossRef] [Google Scholar] [Publisher Link]