Internal Threat Defense using Network Access Control and Intrusion Prevention System
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 9
Abstract
This study aims to create a network security system that can mitigate attacks carried out by internal users and to reduce attacks from internal networks. Further, a network security system is expected to be able to overcome the difficulty of mitigating attacks carried out by internal users and to improve network security. The method used is to integrate the ability of Network Access Control (NAC) and the Intrusion Prevention System (IPS) that have been designed and implemented in this study, then an analysis is performed to compare the results of tests that have been carried out using only the NAC with the results using integration of NAC capabilities and IPS. The results obtained from the tests that have been carried out, namely, the security system by using the integration of NAC and IPS capabilities is better than using only the NAC.
Authors and Affiliations
Andhika Surya Putra, Nico Surantha
English-Arabic Hybrid Machine Translation System using EBMT and Translation Memory
The availability of a machine translation to translate from English-to-Arabic with high accuracy is not available because of the difficult morphology of the Arabic Language. A hybrid machine translation system between Ex...
Deep Gated Recurrent and Convolutional Network Hybrid Model for Univariate Time Series Classification
Hybrid LSTM-fully convolutional networks (LSTM-FCN) for time series classification have produced state-of-the-art classification results on univariate time series. We empirically show that replacing the LSTM with a gated...
An Automatic Segmentation Algorithm for Solar Filaments in H-Alpha Images using a Context-based Sliding Window
There are many features which appear on the surface of the sun. One of these features that appear clearly are the dark threads in the Hydrogen alpha (Hα) spectrum solar images. These ‘filaments’ are found to have a defin...
Smart Tourism Architectural Model (Kingdom of Saudi Arabia: A Case Study)
The researchers have proposed and implemented a general application architecture model that complies with the demands of the Saudi tourism sector to be used by tourists on their mobile devices. The design architecture ai...
A Hybrid Model for Secure Data Transfer in Audio Signals using HCNN and DD DWT
In today’s world, there are a number of cryptographic and steganography techniques used in order to have secured data transfer between a sender and a receiver. In this paper a new hybrid approach that integrates the meri...