Implementation Of Authentication Systems On Hotspot Network Users To Improve Computer Network Security
نویسندگان
چکیده
Because of the growing number apps that use client servers, both desktop and WEB applications, each user must learn a large ids passwords, because application requires authentication in order to it for security reasons. Furthermore, development network media, wired wireless, is accelerating. In scenarios stated above, RADIUS (Remote Authentication Dial-In User Service) technology required since approach allows utilize single id access several web-based. The protocol may be used with wireless media.
منابع مشابه
Network Security Analysis Based on Authentication Techniques
Network Security issues are now becoming important as society is moving to digital information age. Data security is the utmost critical component in ensuring safe transmission of information through the internet. It comprises authorization of access to information in a network, controlled by the network administrator. The task of Network security not only requires ensuring the security of end ...
متن کامل" Computer Network Security "
The book gives an extensive overview of network security and the necessary cryptography. It covers standards and protocols in great detail, and can serve as a handy reference for people interested in this area. Due to the many exercises, it can also serve as one of the textbooks of an introductory course on network security. 1 What the book is about The book is intended as a textbook for a one-...
متن کاملUsing Overlays to Improve Network Security
As we increase our dependency upon networked communication, the incentive to compromise and degrade network performance increases for those who wish to disrupt the flow of information. Attacks that lead to such compromise and degradation can come in a variety of forms, including distributed denial of service (DDoS) attacks, cutting wires, jamming transmissions, and monitoring/eavesdropping. Use...
متن کاملProgramming routers to improve network security
Denial of Service (DoS ) attacks represent, in today’s Internet, one of the most complex issues to address. In this paper we present a novel approach to deal with Distributed DoS (DDoS ) attacks in the Internet. We propose a model for an Active Security System, comprising a number of components that actively cooperate in order to effectively react to a wide range of attacks. Functional to our a...
متن کاملNetwork Security using Firewall and Cryptographic Authentication
The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal Of Cyber And It Service Management
سال: 2022
ISSN: ['2797-1325', '2808-554X']
DOI: https://doi.org/10.34306/ijcitsm.v2i1.93