International Journal of Communications, Network and System Sciences

Volume 5, Issue 8 (August 2012)

ISSN Print: 1913-3715   ISSN Online: 1913-3723

Google-based Impact Factor: 0.66  Citations  h5-index & Ranking

Network Access Control Technology—Proposition to Contain New Security Challenges

HTML  Download Download as PDF (Size: 1485KB)  PP. 505-512  
DOI: 10.4236/ijcns.2012.58061    6,707 Downloads   11,073 Views  Citations

ABSTRACT

Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance; In order to proactively block such threats we need more integrated information security solution. To achieve this objective, we will analyze a real-world security platform, and focus on some key components Like, NAC, Firewall, and IPS/IDS then study their interaction in the perspective to propose a new security posture that coordinate and share security information between different network security components, using a central policy server that will be the NAC server or the PDP (the Policy Decision Point), playing an orchestration role as a central point of control. Finally we will conclude with potential research paths that will impact NAC technology evolution.

Share and Cite:

A. Lakbabi, G. Orhanou and S. El Hajji, "Network Access Control Technology—Proposition to Contain New Security Challenges," International Journal of Communications, Network and System Sciences, Vol. 5 No. 8, 2012, pp. 505-512. doi: 10.4236/ijcns.2012.58061.

Cited by

[1] A novel deep learning based security assessment framework for enhanced security in swarm network environment
International Journal of Critical …, 2022
[2] Analysis of Current Preventive Approaches in the Context of Cybersecurity
2022 IEEE International Carnahan …, 2022
[3] Device-Type Profiling for Network Access Control Systems using Clustering-Based Multivariate Gaussian Outlier Score
The 5th International …, 2021
[4] A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability'that needs to be fostered in information security practitioners and how this can be …
2020
[5] 블록체인 기반 이동식 저장 장치 기록 관리 시스템
2020
[6] Tietoturvariskit ja niiden hallinta BYOD-ympäristössä
2020
[7] Performance of a security control scheme for a health data exchange system
2020
[8] Industry 4.0 Value Roadmap: Integrating Technology and Market Dynamics for Strategy, Innovation and Operations
2019
[9] Value Roadmap Development for Telecommunication Industry
2019
[10] Network Security Management and Implementation Based on ACL
2018
[11] Network Access Control and Collaborative Security Against APT and AET
Security and Privacy in Smart Sensor Networks, 2018
[12] Contrôle d'Accès Réseau de Nouvelle Génération Convergence vers un Ecosystème de Sécurité
2017
[13] Contextual Security with IF-MAP
2014
[14] Secure Mobile Deployment of NFL Training Materials
2014

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.