Browse > Article
http://dx.doi.org/10.7840/kics.2016.41.9.1103

Network Defense Mechanism Based on Isolated Networks  

Jung, Yongbum (Soongsil University Department of IT Convergence)
Park, Minho (Soongsil University Department of IT Convergence)
Abstract
Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.
Keywords
Network separation; Integrity Check; Network Access Control;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 J.-D. Lim and J.-N. Kim, "A study on the trusted app.-based access control to the isolated trusted execution environment in mobile device," in Proc. KICS Int. Conf. Commun., pp. 364-365, Jun. 2014.
2 W.-J. Lee, K.-W. Kim, K.-D. Bu, and J. Woo, "A study on the adoption of NAC for guaranteeing reliability of u-Campus network," J. KIIT, vol. 7, no. 4, 2009.
3 J. Bickford, R. O' Hare, A. Baliga, V. Ganapathy, and L. Iftode, " Rootkits on smart phones: Attacks, implications and opportunities," in HotMobile'10, ACM, Feb. 2010.
4 S. H. Paik, S.-K. Kim, and H. B. Park, "Design and implementation of network access control for security of company network," J. IEEK, vol. 47, no. 12, Dec. 2010.