Network Defense Mechanism Based on Isolated Networks 


Vol. 41,  No. 9, pp. 1103-1107, Sep.  2016


PDF
  Abstract

Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Jung and M. Park, "Network Defense Mechanism Based on Isolated Networks," The Journal of Korean Institute of Communications and Information Sciences, vol. 41, no. 9, pp. 1103-1107, 2016. DOI: .

[ACM Style]

Yongbum Jung and Minho Park. 2016. Network Defense Mechanism Based on Isolated Networks. The Journal of Korean Institute of Communications and Information Sciences, 41, 9, (2016), 1103-1107. DOI: .

[KICS Style]

Yongbum Jung and Minho Park, "Network Defense Mechanism Based on Isolated Networks," The Journal of Korean Institute of Communications and Information Sciences, vol. 41, no. 9, pp. 1103-1107, 9. 2016.