CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Securing Network using Network Access Control, User and Resource Management, and Location-based Security

by Darvinder Kaur, Sonampreet Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 21
Year of Publication: 2012
Authors: Darvinder Kaur, Sonampreet Kaur
10.5120/7067-9727

Darvinder Kaur, Sonampreet Kaur . Securing Network using Network Access Control, User and Resource Management, and Location-based Security. International Journal of Computer Applications. 46, 21 ( May 2012), 27-30. DOI=10.5120/7067-9727

@article{ 10.5120/7067-9727,
author = { Darvinder Kaur, Sonampreet Kaur },
title = { Securing Network using Network Access Control, User and Resource Management, and Location-based Security },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 21 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number21/7067-9727/ },
doi = { 10.5120/7067-9727 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:40:38.900248+05:30
%A Darvinder Kaur
%A Sonampreet Kaur
%T Securing Network using Network Access Control, User and Resource Management, and Location-based Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 21
%P 27-30
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The first and primary law of network access control is to limit the access of network resources among the various types of users. NAC basically decides whom to let go onto the network. It decides the validity of user based on their identity and role. But its work does not stop on user authorization. What happens when user gets access to the network resources? This will be described in this paper. In this paper we present a way to secure the network resources using identity-based, role-based and behaviour-based network access control techniques. Resources will be divided into 5 categories and according to the role of user; access to these resources will be defined. These permissions can be changed on the bases of behaviour of the user. This will make NAC dynamic. And for dynamic user management, clusters of user will be formed based on their behaviour. To secure the network location-based security will be used.

References
  1. Lichuin Bao (2008) "Location Authentication Methods for Wireless Network Access Control", International conference on computer engineering and technology
  2. Yabin Liu, Huanguo Zhang , Huanguo Zhang and Bo Zhao(2009) Research on Unified Network Access Control Architecture 2009 IEEE Ninth International Conference on Computer and Information Technology.
  3. Vanessa Frias-Martinez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis(2009)" A Network Access Control Mechanism Based on Behavior Profiles", Annual Computer Security Applications ConferenceTavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  4. Zhen Chen, Fa-Chao Deng, An-An Luo, Xin Jiang, Guo-Dong Li, Run-hua Zhang, Chuang Lin(2010)" Application Level Network Access Control System Based on TNC Architecture for Enterprise Network", Natural Science Foundation of China No. 90718040, National High-Tech Program No. 2007 AAO 1 Z468, Hosun Tech.
  5. Shujuan Wang, Mangui Liang (2010)" A Network Access Control Approach for QoS Support based on the AAA Architecture", International Symposium on Intelligence Information Processing and Trusted Computing.
  6. Song, Tiantong You (2010)"A network access control mechanism based on role and behavior", Proceedings of IC-BNMT20 10.
  7. Yanzhe Che, Qiang Yang, Chunming Wu, Lianhang Ma(2010)" BABAC: An access control framework for network virtualization using user behaviors and attributes, IEEE/ACM International Conference on Green Computing and Communications & 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing
  8. Zhao Jianguang, Liu Jianchen, Fan Jingjing, Di Juxing" The security research of Network Access Control System, 2010 First ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery,E-Commerce and Its Applications, and Embedded
  9. BAI Qing-hai and ZHENGYing (2011)," Study on the Access Control Model in Information Security", 2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference
Index Terms

Computer Science
Information Sciences

Keywords

Network Access Control User And Resource Management And Location-based Security