Internal service of an enterprise admission control

Many organizations have a need of exposing their internal services to its employees to facilitate work from anywhere. Being able to access these services from any device or network has always made implementing safe access control challenging. User-based access control through the use of multi-factor authentication is typically used to create access control for such purposes. Research suggests a safe network access control method for granting access to internal services to a certain group of devices that abide by the security guidelines of an organisation. It tries to improve on current port knocking techniques by making services available to a specified group of devices rather than merely a small group of people.

[1]  Swati Swayamsiddha,et al.  A Review of ONDC's Digital Warfare in India Taking on the e-Commerce Giants , 2022, SSRN Electronic Journal.

[2]  Md Meraj Ansari,et al.  Threats and Opportunities with AI-based Cyber Security Intrusion Detection: A Review , 2022, International Journal of Software Engineering & Applications.

[3]  Md Meraj Ansari,et al.  The Impact and Limitations of Artificial Intelligence in Cybersecurity: A Literature Review , 2022, IJARCCE.

[4]  C. Pradhan,et al.  Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach , 2022, Sensors.

[5]  Ika Hariyanti HUBUNGAN EFEKTIVITAS PENGENDALIAN INTERNAL TERHADAP ENTERPRISE RESOURCE PLANNING (ERP) PADA KANTOR KONSULTAN CAMILLE SEMARANG , 2022, JAKA (Jurnal Akuntansi, Keuangan, dan Auditing).

[6]  Ahmed J. Obaid,et al.  Securing e-Health application of cloud computing using hyperchaotic image encryption framework , 2022, Comput. Electr. Eng..

[7]  K. Prakash,et al.  Particle swarm optimization performance improvement using deep learning techniques , 2022, Multimedia Tools and Applications.

[8]  D. Koundal,et al.  A fuzzy convolutional neural network for enhancing multi-focus image fusion , 2022, J. Vis. Commun. Image Represent..

[9]  Pawan Kumar Sharma,et al.  Prevention of Phishing Attacks Using AI-Based Cybersecurity Awareness Training , 2022, International Journal of Smart Sensor and Adhoc Network..

[10]  H. Garg,et al.  Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network , 2022, Multimedia Tools and Applications.

[11]  D. P. Yadav,et al.  Bone Cancer Detection Using Feature Extraction Based Machine Learning Model , 2021, Computational and mathematical methods in medicine.

[12]  Karan Bajaj,et al.  A Comparative Performance Assessment of Optimized Multilevel Ensemble Learning Model with Existing Classifier Models , 2021, Big Data.

[13]  Ibrahim S. Alsukayti,et al.  An Intelligent Optimized Route-Discovery Model for IoT-Based VANETs , 2021, Processes.

[14]  Shivendra Shivani,et al.  Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text , 2021, Complex & Intelligent Systems.

[15]  Bhisham Sharma,et al.  Implementation analysis of IoT-based offloading frameworks on cloud/edge computing for sensor generated big data , 2021, Complex & Intelligent Systems.

[16]  Dohyeun Kim,et al.  A Review on Various Applications of Reputation Based Trust Management , 2021, Int. J. Interact. Mob. Technol..

[17]  Bhisham Sharma,et al.  A novel dynamic clustering approach for energy hole mitigation in Internet of Things‐based wireless sensor network , 2021, Int. J. Commun. Syst..

[18]  Mohammad S. Obaidat,et al.  Routing and collision avoidance techniques for unmanned aerial vehicles: Analysis, optimal solutions, and future directions , 2020, Int. J. Commun. Syst..

[19]  Ankur Dumka,et al.  Performance Analysis of DDoS Attack on SDN and Proposal of Cracking Agorithm , 2020, Int. J. Inf. Technol. Proj. Manag..

[20]  Gautam Srivastava,et al.  Real-time cheating immune secret sharing for remote sensing images , 2020, Journal of Real-Time Image Processing.

[21]  D Babitha,et al.  Automated Road Safety Surveillance System using Hybrid CNN-LSTM Approach , 2020 .

[22]  Mohammad S. Obaidat,et al.  Comparative analysis of IoT based products, technology and integration of IoT with cloud computing , 2020, IET Networks.

[23]  Ramya Govindaraj,et al.  Optimal feature extraction and classification-oriented medical insurance prediction model: machine learning integrated with the internet of things , 2020, International Journal of Computers and Applications.

[24]  Mohammad S. Obaidat,et al.  Statistical vertical reduction‐based data abridging technique for big network traffic dataset , 2019, Int. J. Commun. Syst..

[25]  Prabhjot Kaur,et al.  Network Traffic Classification Using Multiclass Classifier , 2018 .

[26]  Fakariah Hani Mohd Ali,et al.  Simple port knocking method: Against TCP replay attack and port scanning , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[27]  Vijay Kumar Chaurasiya,et al.  Advanced port knocking authentication scheme with QRC using AES , 2011, 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC).

[28]  Ned Freed,et al.  Behavior of and Requirements for Internet Firewalls , 2000, RFC.

[29]  Junyu Zhang On The Impact of Financial Sharing Mode on Enterprise Internal Control -- Taking S Company as An Example , 2022, 2022 2nd International Conference on Management Science and Industrial Economy Development (MSIED 2022).

[30]  Bhisham Sharma,et al.  A Review to Forest Fires and Its Detection Techniques Using Wireless Sensor Network , 2020 .

[31]  Mohammad S. Obaidat,et al.  Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes , 2020, Ad Hoc Sens. Wirel. Networks.

[32]  Mohammad S. Obaidat,et al.  A Comparative Study on Frameworks, MAC Layer Protocols and Open Research Issues in Internet of Things , 2019, Ad Hoc Sens. Wirel. Networks.

[33]  Arti Sood,et al.  NETWORK ACCESS CONTROL , 2007 .