VOID 2.1v – Invisible Security

The VOID 2.1v is an upgrade from the unreleased version 2.0 project of the Moses Ike Organization. VOID is a Proprietary Cyber-Security Framework Architecture that is currently being developed to provide Network Security Solutions to Enterprise Networks. Please note that this framework can also be implemented on a Software Defined Network, or on Unified Cloud Computing Systems.


void1 copy


The Enterprise version VOID 2.1vXL is a “Wide Area Network” architecture built upon the authentication capability and operations of the routing and switching protocols (BGP, EIGRP, OSPF, IS-IS, STP, IEEE 802.1Q, W) together with the IOS process-functions of network routers and switches in the Wide Area Network. A Finite State Machine Algorithm FSMA is implemented among the routers and switches to detect intrusion, and then route unauthorized packets and access into a VOID. This means they get access, but to no where: technically, a virtual loop or a ‘black hole’. Therefore, any Computer Network implementing the VOID framework will appear to be invisibly existent to malicious attacks, hence the term “Invisible Security”.
More documentation will be released nearing the completion of the project

VOID 2.1vL framework is designed for large, but isolated Local Area Networks. This is suited for Companies without branch locations, but with more than 200 host devices. The framework architecture is similar to the VOID 2.1vXL but in this case, the Finite State Machine Algorithm is implemented locally, but dynamically. Few Demilitarized Zones, DMZ is created and incorporated into the FSM Algorithm procedure, to provide Security for Devices providing services to the internet. In this way, those “publicly-accessible” devices, mostly Servers, can be assured protection against DoS and other attacks from the outside. Aggressive Port-Security is also included in this framework to protect the Access Layer Switches from internal invasion.
Advanced Penetration and Exploitation techniques are being bombarded on our test Network to verify its invincibility, and its ability to stay hidden, hence the term “Invisible Security.”
More documentation will be released later.

VOID 2.1vM framework is designed for small businesses with less than 100 host devices. The framework architecture is similar to VOID 2.1vL, and it also uses the FSM Algorithm to stay hidden from intrusion. Homes and household networks can also implement the VOID 2.1vM, where firewall intelligence will be much more optimized with the “middle-router” authentication of the 2.1vM architecture.
More documentation will be released later.


Special Thanks:

Dr.  Charles Shields

(Automata Theory)

Erik Jonsson School of Engineering and Computer Science

The University of Texas at Dallas


Dr.  Linda Morales

(Discrete Mathematics and Combinatorics)

Erik Jonsson School of Engineering and Computer Science

The University of Texas at Dallas


Prof. Juanita Marquez

(TCP/IP Routing, Switching, and Security)

Cisco Networking Academy