首页> 外文会议>2010 IEEE International Conference on Wireless Communications, Networking and Information Security >Application Level Network Access Control System Based on TNC Architecture for Enterprise Network
【24h】

Application Level Network Access Control System Based on TNC Architecture for Enterprise Network

机译:基于TNC架构的企业网络应用级网络访问控制系统

获取原文

摘要

Traditional NAC system in enterprise network is in coarse granularity (e.g. IP or MAC address) and lack of flexibility. Recently the demand in tight control of the enterprise network to defense the misuse and security issues become more and more urgent. Based on the TCG TNC standard, an application level network access control mechanism is proposed and implemented. With TNC client/server model in hand, a client is designed to enhance TNC client with the function of host flow controller (HFC), and intercepts each application network access request(ANAR) and transfer it to PDP server to authorize the access request. When a sensor (i.e. intrusion detection system) detects any malicious traffic, host flow controller and network flow controller can identify the application that origins this traffic by querying Metadata Access Point (MAP) server and block this application’s network access. A prototype system is implemented to demonstrate the design and can be used to defense the anomaly network behaviors. The prototype system demonstrates that the hosts, switches, firewalls and IDS can work together to detect, diagnose and protect enterprise network from the malicious applications attack initiated inside or outside of an enterprise network, quarantine unhealthy hosts and make the enterprise network more reliable and trustworthy.
机译:企业网络中的传统NAC系统粒度较粗(例如IP或MAC地址)且缺乏灵活性。近来,对企业网络进行严格控制以防御滥用和安全问题的需求变得越来越紧迫。基于TCG TNC标准,提出并实现了一种应用级网络访问控制机制。借助TNC客户端/服务器模型,客户端被设计为利用主机流控制器(HFC)的功能增强TNC客户端,并拦截每个应用程序网络访问请求(ANAR)并将其传输到PDP服务器以授权访问请求。当传感器(即入侵检测系统)检测到任何恶意流量时,主机流控制器和网络流控制器可以通过查询元数据访问点(MAP)服务器来识别源自此流量的应用程序,并阻止该应用程序的网络访问。实现了原型系统以演示设计,并可用于防御异常网络行为。该原型系统演示了主机,交换机,防火墙和IDS可以协同工作,以检测,诊断和保护企业网络免受企业网络内部或外部发起的恶意应用攻击,隔离不健康的主机,并使企业网络更加可靠和可信。 。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号