Security in Virtual DMZ designs
Loading...
Supplementary material
Other Title
Authors
Sathu, Hira
Komosny, Dan
Singh, S.
Komosny, Dan
Singh, S.
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2014-07
Supervisors
Type
Conference Contribution - Paper in Published Proceedings
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
virtualisation
emulation
computer security
virtual DMZ (Demilitarized Zone)
firewalls
emulation
computer security
virtual DMZ (Demilitarized Zone)
firewalls
ANZSRC Field of Research Code (2020)
Citation
Sathu, H., Komosny, D., and Singh, S. (2014, July). Security in Virtual DMZ Designs. GBATA Readings Book 2014 (Ed.), Proceedings of The GBATA’s Sixteenth Annual International Conference, Baku, Azerbaijan, July 8-12th, 2014 (pp.1-7).
Abstract
Virtualization as a technology has existed for almost three decades now. By emulating physical resources, virtualization enables to utilize the full capacity of their hardware resources. Traditional physical DMZs (demilitarized zones) can be virtualized in three different ways. In this paper, the level of security of these three virtualized DMZs was compared to the level of security of traditional physical DMZs. The DMZs considered, represented a typical part of a network of an organization. A test bed was set up Using VMware ESXi 4.1 hypervisor to determine which DMZ design was the most secure. A quantitative research methodology approach was used to collect data with the help of a range of vulnerability assessment tools. Based on the research, the conclusion was drawn that all security elements, like firewalls and the inspection algorithms in the firewall, determine the level of security of a virtual DMZ and not its being physical or virtual.
Publisher
Global Business and Technology Association (New York)
Permanent link
Link to ePress publication
DOI
Copyright holder
Authors
Copyright notice
All rights reserved