z-logo
open-access-imgOpen Access
Enhancing the Design of a Secured Campus Network using Demilitarized Zone and Honeypot at Uew- kumasi Campus
Author(s) -
Solomon Nii Nikoi,
Christian Adu-Boahene,
Alberta Nsiah-Konandu
Publication year - 2022
Publication title -
asian journal of research in computer science
Language(s) - English
Resource type - Journals
ISSN - 2581-8260
DOI - 10.9734/ajrcos/2022/v13i130304
Subject(s) - honeypot , dmz , computer security , campus network , exploit , network security , computer science , university campus , firewall (physics) , software deployment , intrusion detection system , business , operating system , accretion (finance) , schwarzschild radius , finance , library science , charged black hole
The increasing complexity of information systems, as well as the rapid development of new vulnerabilities and exploits, the security of campus networks needs to be hardened to minimize or eradicate security flaws. Aim: To discover the vulnerabilities and enhance the creation and deployment of secured campus network.  Place and Duration of study: University of Education, Winneba – Kumasi campus. Methodology:  The integration of De-Militarized zone and Honeypot techniques was used to beef up the security of the campus network against vulnerabilities and exploits. Penetration testing was used in the assessment of the University of Education’s network infrastructure, and to demonstrate attacks and intrusion into the network infrastructure. Results: Two firewall DMZ architecture techniques protect sensitive resources of the campus network by sanctioning the inflow and outflow of traffic, determining which segment allow and disallow traffic,   whiles the Honeypot techniques were configured to keep the attention of attackers diverted from the main network, the full strength of an attack, until the administrators are prepared to put the effective counter in place. The fusion of DMZ and, Honeypot provide the System Administrators to effectively management the security of the campus networks. Conclusion: Honeypots are used to detect vulnerabilities based on the attacker’s behaviour and, data collected by honeypots can be used to enhance other security technologies.  The fusion of DMZ and Honeypot into the security models of the campus network made it more robust.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here