IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 5 - Issue 4, April 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Access Agent: Improving The Performance Of Access Control Lists

[Full Text]

 

AUTHOR(S)

Thelis R. S., Lakshani H. G. S., Samarawickrama S. S., KavinMukesh A., Wickramasinghe W. A. S. M., Dhammearatchi D.

 

KEYWORDS

Access Control Lists, Extranet, Sensitive data, dedicated device, router workload, Meta-ACL profile, extended ACL

 

ABSTRACT

The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations, where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists (ACLs) method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organization’s ACLs performance to be improved, to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

 

REFERENCES

[1] J. Qian, S. Hinrichs and K. Nahrstedt, "ACLA: A Framework for Access Control List (ACL) Analysis and Optimization", Communications and Multimedia Security Issues of the New Century, pp. 197-211, 2001.

[2] S. Kommula, I. Hsu, R. Jalan and D. Cheung, "Patent US7254626 - Global server load balancing", Google Books, 2016. [Online]. Available: http://www.google.com/patents/US7254626. [Accessed: 02- Feb- 2016].

[3] L. Cheng, "Style sheet transformation driven firewall access list generation", Google Books, 2002. [Online]. Available: http://www.google.com/patents/US20020184525. [Accessed: 03- Feb- 2016].

[4] R. Brown and R. Greenberg, "System and method for controlling access to data entities in a computer network", Google Books, 1999. [Online]. Available: http://www.google.com/patents/US5941947. [Accessed: 03- Feb- 2016].

[5] J. He and R. Hall, "Security system and method for network element access", Google Books, 2000. [Online]. Available: http://www.google.com/patents/US6088451. [Accessed: 02- Feb- 2016].

[6] S. Fan and S. Truong, "Access control for networks", 2001. [Online]. Available: https://www.google.com/patents/US6219706. [Accessed: 02- Feb- 2016].

[7] A. Nayak, A. Reimers, N. Feamster and R. Clark, "Resonance", Proceedings of the 1st ACM workshop on Research on enterprise networking - WREN '09, 2009. [Online]. Available: http://dl.acm.org/citation.cfm?id=1592684. [Accessed: 02- Feb- 2016].

[8] S. Hachana, N. Cuppens-Boulahia and F. Cuppens, "Mining a high level access control policy in a network with multiple firewalls", Journal of Information Security and Applications, vol. 20, pp. 61-73, 2015.

[9] I. Cibrario Bertolotti, L. Durante, L. Seno and A. Valenzano, "A twofold model for the analysis of access control policies in industrial networked systems", Computer Standards & Interfaces, vol. 42, pp. 171-181, 2015.

[10] M. Imran-Daud, D. Sánchez and A. Viejo, "Privacy-driven access control in social networks by means of automatic semantic annotation", Computer Communications, vol. 76, pp. 12-25, 2016.

[11] "Cisco IOS Security Configuration Guide, Release 12.2 - Access Control Lists: Overview and Guidelines [Cisco IOS Software Release 12.2]", Cisco, 2016. [Online]. Available: http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfacls.html. [Accessed: 01- Mar- 2016].