Georgia Tech’s network-based approach has significant advantages over the current industry approach of using network access control (NAC) solutions. This unique hardware signature (akin to a fingerprint) makes it possible to determine whether a node is authorized to access the network, regardless of whether it achieved that access using legitimate login credentials. This successful solution relies on the signature generated by the “behavior” of data packets-even those that are encrypted-and leaked into normal network traffic by the hardware. Using hardware signatures that are innate in network traffic, the Georgia Tech system detects unauthorized devices that are inserted into the network. Abdul Raheem Beyah and Cherita Corbett from the School of Electrical and Computer Engineering at Georgia Tech have developed an innovative intrusion detection system (IDS) with an entirely new approach to detecting evolving threats.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |