DocumentCode :
1582994
Title :
On Implementing Real-time Detection Techniques in Future Network Access Control (NAC)
Author :
Ashraf, Adnan ; Hashmani, Manzoor ; Chowdhry, B.S.
Author_Institution :
Mehran Univ. of Eng. & Technol., Jamshoro
fYear :
2008
Firstpage :
1
Lastpage :
6
Abstract :
Designing network security perimeters to nullify security threats is the objective of ´security gurus´ involved in the development of security applications and devices. An organization, not uncompromising on security, dedicates a hefty budget proportion for deploying security plans and updates. Fighting and chasing the modern attackers 24times7 has enforced thoughts of redesigning security framework. Existing perimeter is layered of border routers, firewalls, IDS, IPS, VPN devices, software architecture over DMZs and subnets, beside server and host filters and antivirus applications. These are not fully customizable against adversaries in providing strong security framework. The current deployment nature of security perimeter where these layered components are prone to various egress and ingress nasty activities raises some serious questions. The traditional perimeters do not provide sufficient security to overcome these limitations in order to provide uncompromised security nodes [3][11][12]. To address security needs efficiently, at critical knots within a network, we introduce a security framework. The proposed framework focuses three key areas related to defense-in-depth; (1) maximizing synchronization among layered security services (2) modularizing various services for better endpoint security (3) reducing traffic while providing secure mechanism for encrypted updates in traditional networks. We show through analysis and emulation that our proposed framework meets the unique security needs of network infrastructure in a better way.
Keywords :
authorisation; computer networks; synchronisation; telecommunication security; network access control; network security; real-time detection technique; synchronization; Access control; Application software; Authentication; Communication system traffic control; Filters; Intrusion detection; Software architecture; Switches; Telecommunication traffic; Virtual private networks; Antivirus retention; Network access control; Network security perimeter; Network switch security; Security framework;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on
Conference_Location :
Damascus
Print_ISBN :
978-1-4244-1751-3
Electronic_ISBN :
978-1-4244-1752-0
Type :
conf
DOI :
10.1109/ICTTA.2008.4530293
Filename :
4530293
Link To Document :
بازگشت