Snehasish Parhi

Work place: Department of Computer Center, National Institute of Technology, Rourkela, Odisha, India

E-mail: sparhi@nitrkl.ac.in

Website:

Research Interests: Computer Architecture and Organization, Intrusion Detection System, Process Control System, Error Control, Data Structures and Algorithms

Biography

Parhi Snehasish, received MCA degree on 2003. Currently, he is working as Scientific Officer in National Institute of Technology (NIT), Rourkela since March 2007. He has total 12 years of experience on teaching, server administration and network administration in datacenter environment. His main research interests include network access control, Intrusion detection and prevention system and email security.

Author Articles
Attacks Due to Flaw of Protocols Used in Network Access Control (NAC), Their Solutions and Issues: A Survey

By Snehasish Parhi

DOI: https://doi.org/10.5815/ijcnis.2012.03.05, Pub. Date: 8 Apr. 2012

In order to ensure and enforce endpoint security, Network Access Control (NAC) is attracting considerable interest from the research community. Most NAC architectures are based on 802.1x, EAP (Extensible Authentication Protocol), EAPoL (EAP over LAN) 802.11i, 802.11w, and RADIUS (Remote Authentication Dial-In User Service) protocols. Unprotected management and control frames in some of above protocols lead to several attacks. Eliminating flaws completely in design of each protocol is a challenge. These flaws help malicious user and infected endpoint to intrude into the NAC architecture to make damage into it. Many researches have been carried out to address this issue. In this paper, we have made an attempt to explain attacks in above protocols and present a survey and analysis of different solution approaches proposed by researchers. The affect of vulnerability and attack of above protocols in NAC is also discussed. The finding of this review will provide useful insights into the vulnerabilities, attacks in above protocols, and their proposed solutions with issues, which may create a research scope for strengthening security in NAC.

[...] Read more.
Other Articles