Application Level Network Access Control System Based on TNC Architecture for Enterprise Network

被引:2
作者
Chen, Zhen [1 ]
Deng, Fa-Chao [1 ]
Luo, An-An [1 ]
Jiang, Xin [1 ]
Li, Guo-Dong [1 ]
Zhang, Run-hua [1 ]
Lin, Chuang [1 ]
机构
[1] Tsinghua Univ, Res Inst Informat Technol, Dept Automat & Comp Sci & Technol, TNList, Beijing 100084, Peoples R China
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1 | 2010年
关键词
Network Security; Access Control; Trusted Network Connect; Application Level Access Control;
D O I
10.1109/WCINS.2010.5541863
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional NAC system in enterprise network is in coarse granularity (e.g. IP or MAC address) and lack of flexibility. Recently the demand in tight control of the enterprise network to defense the misuse and security issues become more and more urgent. Based on the TCG TNC standard, an application level network access control mechanism is proposed and implemented. With TNC client/server model in hand, a client is designed to enhance TNC client with the function of host flow controller (HFC), and intercepts each application network access request(ANAR) and transfer it to PDP server to authorize the access request. When a sensor (i.e. intrusion detection system) detects any malicious traffic, host flow controller and network flow controller can identify the application that origins this traffic by querying Metadata Access Point (MAP) server and block this application's network access. A prototype system is implemented to demonstrate the design and can be used to defense the anomaly network behaviors. The prototype system demonstrates that the hosts, switches, firewalls and IDS can work together to detect, diagnose and protect enterprise network from the malicious applications attack initiated inside or outside of an enterprise network, quarantine unhealthy hosts and make the enterprise network more reliable and trustworthy.
引用
收藏
页码:667 / 671
页数:5
相关论文
共 8 条
[1]  
[Anonymous], TCG TRUST NETW CONN
[2]  
*CSI FBI, 2005, COMP CRIM SEC SURV
[3]  
*INTEROP LABS, 2007, WHAT IS CISC NAC
[4]  
LORCH M, 2003, ACM 2003
[5]  
*OASIS EXTENSIBLE, 2006, XML COMMUNITY P 0621
[6]  
*TRUST COMP GROUP, 2006, TCG TRUST NETW CONN
[7]  
*TRUST COMP GROUP, 2007, TCG TRUST NETW CONN
[8]  
WHITELEY R, 2006, DEMYSTIFYING NAC GOI