2019
DOI: 10.14569/ijacsa.2019.0100948
|View full text |Cite
|
Sign up to set email alerts
|

Internal Threat Defense using Network Access Control and Intrusion Prevention System

Abstract: This study aims to create a network security system that can mitigate attacks carried out by internal users and to reduce attacks from internal networks. Further, a network security system is expected to be able to overcome the difficulty of mitigating attacks carried out by internal users and to improve network security. The method used is to integrate the ability of Network Access Control (NAC) and the Intrusion Prevention System (IPS) that have been designed and implemented in this study, then an analysis i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 10 publications
0
1
0
Order By: Relevance
“…The test results obtained that the integration of cisco ISE as Network Access Control (NAC) and Cisco Firepower 8250 devices as IPS can prevent attacks to HTTP ports, SQL Injection, and OS Bash Injection Attack the server from internal attacks. Compared to using only NAC devices because Cisco ISE devices can not prevent such attacks [4].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The test results obtained that the integration of cisco ISE as Network Access Control (NAC) and Cisco Firepower 8250 devices as IPS can prevent attacks to HTTP ports, SQL Injection, and OS Bash Injection Attack the server from internal attacks. Compared to using only NAC devices because Cisco ISE devices can not prevent such attacks [4].…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is crucial to safeguard computer networks and systems from unauthorized access and malicious activities. IDPS monitors network traffic and analyzes it for any signs of suspicious or malicious behavior [17]- [19]. IDPS includes detecting and preventing unauthorized access attempts, malware attacks, and other security breaches [20], [21].…”
Section: Introductionmentioning
confidence: 99%