Design and Implementation of A Secure Campus Network: Author:-Swapnil Kushwaha
Design and Implementation of A Secure Campus Network: Author:-Swapnil Kushwaha
Abstract— Security has been a polar issue within the elevated availableness, glorious performance, good infrastruct
style associated readying of an enterprise network.AS ure, and security. Securing an enormous network has
increase and merging of new technologies like cloud been invariably a problem to associate IT manager.
computing, Enterprise quality and e-commerce, There are plenty of similarities between
network security has still remained as big increasing securing associate oversize network and university
challenge. A field network is a very important a part of network however everyone has its own problems and
field life and network security is important for a field. challenges. Gift academic establishments pay a lot
Field network faces challenges to handle core problems of attention thereto to enhance their students’ learning expertise.
with security that area unit ruled by specification. Architects of field can do this if IT managers hold on to the
Secured network protects an establishment from elemental principles self-addressed during
security attacks related to network. A university this reference design, particularly LAN or
network encompasses a variety of uses, like teaching, WAN property style issues, security, and centralized manage
learning, research, management, e-library, result men .
publication and reference to the external users. The network infrastructure style has become
Network security can stop the university network from an important half for a few IT organizations in recent years. A
differing kinds of threats and attacks. The theoretical vital network style thought for today's networks is making the
contribution of this study may be a reference model potential to support future growth in an
design of the university field network which will be exceedingly reliable, ascendable and secure manner. This
followed or tailored to make a sturdy however versatile needs the designer to outline the client's distinctive state of
network that responds to subsequent generation affairs, significantly the present technology, application,
necessities. A stratified design of the field network is and knowledge design.
organized with differing kinds of security problems for
making certain the standard of service. During this The physical network infrastructure is needed for a
project, a tested and secure network style is projected recent university network. University Management and IT
supported the sensible necessities and this projected manager could apprehend specifically what quite network they
network infrastructure is realizable with flexible require to line up, coming plans, and expected growths.
infrastructure.. Contingencies for future space, power,
and alternative resource should be a part of the physical set
Keywords—Campus Network, Security, WAN, up of a university. Building a recent university network
Security Threats, Network Attacks, VPN, VLAN, atmosphere conjointly contains practical and
Firewall. safety parts that conjointly transcend the IT department’s
obligations and skills.
I. INTRODUCTION Here, completely different analysis papers are consulted for
As the computers and networked systems thrive in security in field network. Lalita Kamari et al introduced varied
today’s world, the requirement for increase and robust pc current network info security issues and their solutions.
and network security becomes more and more necessary They delineated the present security standing of
and vital. The increase within the electronic network the field network, analyzed security threat to field network
system has exposed several networks to varied sorts of and delineated the ways to maintenance of network security
web threats and with this exposure. The security could [3]. The hierarchic network style is taken into account within
embrace identification, authentication and authorization, the projected system and correspondent network are scalable;
and police work camera to safeguard integrity, performance and security are increased; and therefore
convenience, irresponsibleness, and legitimacy of the network are simple to take care of.
component or network instrumentality. There is no laid- A hierarchic design of field network is organized
down procedure for planning a secure network. Network with differing types of traffic hundreds and
security has got to be designed to suit the requirements of security problems for guaranteeing the standard of service
a company.
Campus network is important and it plays a crucial role
II. BACKGROUND
for any organization. Network architecture and its There are various types of network such as Personal Area
security area unit as vital as air, water, food, and shelter. Network (PAN), Local Area Network (LAN), Metropolitan
Computer network security threat and specification area Area Network (MAN), Storage Area Network (SAN) and
it perpetually serious problems. Wide Area Network (WAN).
A field network is AN autonomous
A Personal space Network (PAN) may be an electronic
network underneath the management of a
network organized around a personal person.
university that is inside space| a neighborhood
Personal space Networks generally involve a mobile laptop,
geographical place and generally it should be a MAN.
a mobile phone and/or a hand-held data
Generally, IT manager during a network faces lots processor like a personal organizer. an area space Network
of challenges within the course of maintaining (LAN) may be a cluster of computers and associated devices
that share a typical communications line or wireless Security Issues in Campus Network
link. Typically, connected devices share the
There square measure a large vary of network attacks and
resources of one processor or server at intervals tiny
security threats, network attack methodologies, and
low geographical region. A
categorizations of network attacks.
Metropolitan space Network (MAN) may be
The question is: however can we minimize these network
a network that interconnects users
attacks? The kind of attack, as mere by the categorization
with laptop resources in a very geographical
of intelligence activity, access, or DoS attack, determines
region or region larger than that lined by even an
the suggests that of mitigating a network threat.
oversized native space Network
(LAN) however smaller than the realm lined by a Table 1.
large space Network (WAN). A field space Network Identify the threats
(CAN) may be a proprietary native space Network
(LAN) or set of interconnected LANs serving an Threat Internal Threat consequences
organization, office, university, or similar \
organization. A cargo hold Network (SAN) may be External
a high-speed network of storage devices e-mail with virus External Could infect system reading
that conjointly connects those storage devices with origination email and subsequently
servers. It provides block- level storage which will be internal spread throughout entire
accessed by the applications running on any use organization.
networked servers. a large space Network Network Virus External Could enter through
unprotected ports,
(WAN) may be
compromise whole network.
a geographically spread telecommunications
network. The term distinguishes a broader Web based virus Internal Could cause compromise
telecommunication structure from an browsing on system doing browsing
area space Network (LAN). in depth analysis or to external and subsequently affect
project has been tired the position of spec and site other internal systems.
security problems in field networks . Web server attack External to If web server is
web compromised hacker could
Network Architecture in Campus Networks
servers gain access to other systems
The field network of our study is intended during internal to network
a hierarchal manner that could be
a common apply of field and enterprise networks. It Denial of Internal External services such as
provides a standard topology of building blocks service attack web Email and ftp could
become unusable. If router is
that enable the network to evolve simply.
attack , whole network could
A hierarchal style avoids the requirement for a fully- go down.
meshed network within which all network nodes area Network User Internal Traditional border firewalls
unit interconnected. Attack ( Internal to do nothing for this attack.
Designing a field network might employee) anywhere Internal segmentation
not seem as fascinating or exciting firewall can help contain
damage.
as planning A science telephone network, AN science
video network, or maybe planning a wireless network. Types of Network Attacks:
However, rising applications like these area Classes of attack might embrace passive observation of
unit engineered upon the field foundation. Very like the communications, active network attacks, exploitation by insiders,
development of a house, if the engineering work is skipped and attacks through the service provider info systems and
at the inspiration level, the house can crack and eventually networks supply engaging targets and will be immune to attack
collapse. from the complete vary of threat agents, from hackers to nation -
If the inspiration services Associate in nursing states. A system should be able to limit harm and recover chop -
reference style in an enterprise network don't seem to chop once attacks occur. Here are some attacks types:
be rock-solid, applications that rely upon the services 1. Passive Attack
offered by the network 2. Active Attack
like science telecommunication, science video and 3. Distributed Attack
wireless communications can eventually suffer 4. Insider Attack
performance and responsibility challenges. To continue 5. Close-in Attack
the analogy, if a reliable foundation 6. Phishing Attack
is designed and engineered, the house can indicate years, 7. Hijack attack
growing with the owner through alterations and 8. Spoof attack
expansions to supply safe and reliable service throughout 9. Buffer overflow
its life cycle. 10. Exploit attack
11. Password attack
Real Time Data: Some Network Attacks time knowledge that assailant mistreatment Net cut computer
code exploit the weakness within the homeless creative
A. Denial of Service (DoS):
person protocol because of the dearth of authentication in an
Denial of service (DoS) is an intermission of service either as
exceedingly field network.
a result of the system is destroyed, or as a result
of it's briefly out of stock. Examples embrace destroying a
computer's magnetic disc, cut the physical infrastructure, Fig 2. ARP Spoofing Attack in Campus network
and consumption all out there memory on a resource. Fig1
shows a true continuance of DoS attack knowledge during Traditional Campus Network Design
a field network mistreatment Cyberoam security
device. when piece Firewall and VLAN for DoS attack
Source Destination
Attack
Type Traffic Traffic
Applied Applied
Dropped Dropped
SYN
Yes 44844 No 0
Flood
UDP
Yes 48240 No 0
Flood
TCP
No 0 No 0
Flood
ICMP
Yes 27 Yes 429
Flood
Proposed VLAN for Campus Network Fig 5. VPN Connectivity Diagram for Branch Campus