Demilitarized network to secure the data stored in industrial networks
Corporación Universidad de la Costa
Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as the most appropriate for our application, since it allows efficient exchange of data guaranteeing security and avoiding the violation of the control system. Finally, the simulation of the proposed network is carried out.
- Artículos científicos 
The following license files are associated with this item:
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International
Showing items related by title, author, creator and subject.
Martínez Gómez, Edinson Jabid (Ingeniería de Sistemas, 2013)In this Project we show the development and deployment of a web platform with two kinds of artificial Neural Networks applied to forecast time series. It has been developed with the language of programming Python and use ...
Silva, Jesús; Varela Izquierdo, Noel; Pineda, Omar (Corporación Universidad de la Costa, 2020)In recent years, wireless networks have become a widespread communication technology as well as a research challenge. Many contributions have been made on ad hoc networks, such as wireless sensor networks (WSNs) and vehicular ...
Network anomaly classification by support vector classifiers ensemble and non-linear projection techniques De La Hoz, Eduardo; Ortiz, Andrés; Ortega, Julio; De-La-Hoz-Franco, Emiro (Universidad De La Costa, 2013-09-11)Network anomaly detection is currently a challenge due to the number of different attacks and the number of potential attackers. Intrusion detection systems aim to detect misuses or network anomalies in order to block ...