Work place: Department of Computer Center, National Institute of Technology, Rourkela, Odisha, India
E-mail: sparhi@nitrkl.ac.in
Website:
Research Interests: Computer Architecture and Organization, Intrusion Detection System, Process Control System, Error Control, Data Structures and Algorithms
Biography
Parhi Snehasish, received MCA degree on 2003. Currently, he is working as Scientific Officer in National Institute of Technology (NIT), Rourkela since March 2007. He has total 12 years of experience on teaching, server administration and network administration in datacenter environment. His main research interests include network access control, Intrusion detection and prevention system and email security.
DOI: https://doi.org/10.5815/ijcnis.2012.03.05, Pub. Date: 8 Apr. 2012
In order to ensure and enforce endpoint security, Network Access Control (NAC) is attracting considerable interest from the research community. Most NAC architectures are based on 802.1x, EAP (Extensible Authentication Protocol), EAPoL (EAP over LAN) 802.11i, 802.11w, and RADIUS (Remote Authentication Dial-In User Service) protocols. Unprotected management and control frames in some of above protocols lead to several attacks. Eliminating flaws completely in design of each protocol is a challenge. These flaws help malicious user and infected endpoint to intrude into the NAC architecture to make damage into it. Many researches have been carried out to address this issue. In this paper, we have made an attempt to explain attacks in above protocols and present a survey and analysis of different solution approaches proposed by researchers. The affect of vulnerability and attack of above protocols in NAC is also discussed. The finding of this review will provide useful insights into the vulnerabilities, attacks in above protocols, and their proposed solutions with issues, which may create a research scope for strengthening security in NAC.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals