作者
Haidong Xia, Jayashree Kanchana, José Carlos Brustoloni
发表日期
2005
研讨会论文
NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems: 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005. Proceedings 4
页码范围
154-165
出版商
Springer Berlin Heidelberg
简介
Enterprise firewalls can be easily circumvented, e.g. by attack agents aboard infected mobile computers or telecommuters’ computers, or by attackers exploiting rogue access points or modems. Techniques that prevent connection to enterprise networks of nodes whose configuration does not conform to enterprise policies could greatly reduce such vulnerabilities. Network Admission Control (NAC) and Network Access Protection (NAP) are recent industrial initiatives to achieve such policy enforcement. However, as currently specified, NAC and NAP assume that users are not malicious. We propose novel techniques using secure coprocessors to protect access to enterprise networks. Experiments demonstrate that the proposed techniques are effective against malicious users and have acceptable overhead.
引用总数
200520062007200820092010201120122013201420152016211241013533
学术搜索中的文章
H Xia, J Kanchana, JC Brustoloni - … Technologies, Services, and Protocols; Performance of …, 2005