Browse > Article

Design and Implementation of Network Access Control for Security of Company Network  

Paik, Seung-Hyun (Eelectrical Engineering and Computer Science, Kyungpook National University)
Kim, Sung-Kwang (Technical director, Wizntec)
Park, Hong-Bae (Electronics Engineering, Kyungpook National University)
Publication Information
Abstract
IT environment is rapidly changed, thus security threats such as worms and viruses have increased. Especially company's internal network requires to be inherently protected against these threats. In this respect, NAC(Network Access Control) has attracted attention as new network security techniques. The NAC implements the endpoint access decision based on the collected endpoint security status information and platform measurement information. In this paper, we describe the design and implementation of unauthorized NAC which protect against such as a worm, virus, malware-infected PC, and mobile device to connect to company's internal networks.
Keywords
네트워크 접근제어시스템;네트워크필터;정보보호;공개키(PKI);인증서버;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Gartner, "Gartner's Network Access Control Model", 2005.
2 이원진, 김기원, 부기동, 우종정, "u-Campus의 네트워크 신뢰성 보장을 위한 NAC 도입에 대한 연구", 한국정보기술학회, 제7권 제4호, 252쪽-258쪽, 2009년 8월
3 Mirage Network, "Getting the Knak NAC: Understanding Network Access Control", A Mirage Networks Industry Report, 2006.
4 Interop Labs, "Getting started with Network Access Control", 2006.
5 Interop Lab, "Network ACCess Control Resources", 2006.
6 임재성, "Network Access Control Overview", UNET White Paper, 2006.