International Journal of Systems Engineering

Archive

Submit a Manuscript

Publishing with us to make your research visible to the widest possible audience.

Propose a Special Issue

Building a community of authors and readers to discuss the latest research and develop new ideas.

Secure Remote Network Management and Network Access Control, the Case of University of Education-kumasi Campus

Remote network management and Network Access Control (NAC) are of immense interest to industry since it supports decision making in management and control, and eventually end-user satisfaction. The purpose of this project is to classify a successful remote network management and access control tool for remotely managing a network and network access control at the College of Technology Education, Kumasi. This study utilized remote management tools and network access control techniques such as SSH client, PacketFence and Remote Desktop applications to carefully troubleshoot issues that pertained to the administration of the network of College of Technology Education. The entire system was deployed based on Linux operating system architecture with various workstations and hand-held smart devices as clients; providing real-time network access to network support administrators to remotely resolve problems identified on the network. These systems were also implemented to ensure the operation of security systems and implementation of an effective network access control through the use of Captive Portal. The researcher recommended that since the implemented tools and techniques were able to successfully authenticate user/devices access to the LAN of the College of Technology Education, Kumasi, institutions, organizations etc. should adopt these techniques for network protection and user access control to ensure effective network policy enforcement.

Network Access Control (NAC), Secured Socket Host (SSH), Remote, Validation, Authentication, IP Security

APA Style

Rafique Agyare, Christian Adu-Boahene, Solomon Nii Nikoi. (2022). Secure Remote Network Management and Network Access Control, the Case of University of Education-kumasi Campus. International Journal of Systems Engineering, 6(1), 18-45. https://doi.org/10.11648/j.ijse.20220601.13

ACS Style

Rafique Agyare; Christian Adu-Boahene; Solomon Nii Nikoi. Secure Remote Network Management and Network Access Control, the Case of University of Education-kumasi Campus. Int. J. Syst. Eng. 2022, 6(1), 18-45. doi: 10.11648/j.ijse.20220601.13

AMA Style

Rafique Agyare, Christian Adu-Boahene, Solomon Nii Nikoi. Secure Remote Network Management and Network Access Control, the Case of University of Education-kumasi Campus. Int J Syst Eng. 2022;6(1):18-45. doi: 10.11648/j.ijse.20220601.13

Copyright © 2022 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1. I. Butun, H. Song and P. Österberg, "Security and Internet of Things," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 616-644, 2019.
2. F. Al-Obeidat and E.-S. El-Alfy, "Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols.," Personal and Ubiquitous Computing, vol. 23, no. 5, pp. 777-791, 2019.
3. P. Varga, P. Jozsef, F. Attila and B. David, "5G support for Industrial IoT Applications—Challenges, Solutions, and Research gaps.," Sensors 20, no. 3, p. 828, 2020.
4. A. Shahzad, Z. Kaiwen and G. Abdelouahed, "Intuitive development to examine collaborative iot supply chain system underlying privacy and security levels and perspective powering through proactive blockchain.," Sensors 20, no. 13, p. 3760, 2020.
5. T. T. (Brooks, "Cyber-assurance for the Internet of Things.," John Wiley & Sons, 2017.
6. A. Rakhra, G. Raghav and S. Akansha, "Blockchain and Internet of Things Across Industries.," Machine Learning Approaches for Convergence of IoT and Blockchain, pp. 1-34, 2021.
7. S. Goundar, B. S. Bharath and K. Praveen, "Architecture and Security Issues in Fog Computing Applications.," IGI Global, 2019.
8. J. Moll and Y. Ogan, "The role of internet-related technologies in shaping the work of accountants: New directions for accounting research.," The British Accounting Review 51, no. 6, p. 100833, 2019.
9. W. Steingartner, G. Darko and Andrija, "Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model.," Symmetry, p. 597, 2021.
10. B. Prabha, "An IoT Based Efficient Fire Supervision Monitoring and Alerting System.," In 2019 Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 414-419, 2019.
11. C. de Almeida and. M.. J. Rui, Enhancing Trustability in MMOGs Environments., PhD diss., Universidade da Beira Interior (Portugal), 2017.
12. C. Sanders, Practical Packet Analysis,, No Starch Press, 2007.
13. G. Mitchell, Network Traffic Monitoring Analysis on Quality of Service, 2012.
14. T. (. Rooney, IP Address Management Principles and Practice,, John Wiley & Sons.
15. P. Buck, "A derivation system for security protocols and its logical formalization. In Proceedings of 16th IEEE Computer Security Foundations Workshop," IEEE 2003, 20031, pp. 109-125.
16. E. Caliskan, "Campus network topology discovery and distributed firewall policy generation," 2011.
17. M. (. Clos, "A framework for network traffic analysis using GPUs.," 2010. [Online]. Available: http://upcommons.upc.edu/pfc/bitstream/2099.1/8800/1/Thesis.pdf. [Accessed 17 July 2016].
18. S. P. Srikanth, Gigabit PickPacket: A network Monitoring Tool For Gigabit Networks., 2004.
19. C. J., Perceptions about Network Security Ponemon Institute,, 2011.
20. P. Antoniou, "Network Research Lab, High Speed Multimedia and Multiservice Networks.," 2008. [Online]. Available: http://tools.ietf.org/html/rfc1122. [Accessed 19 August 2016].
21. W. &. T. A. Odom, in Networking basics: CCNA 1 companion, Cisco Press, 2006.
22. L., Wei, "TCP/IP Tutorial and Technical Overview," 2011. [Online]. Available: Ibm.com/redbooks.
23. Q. Hashman, "Bypassing network access control Systems. OfirArkin, CTO," in Bypassing network access control Systems. OfirArkin, CTO, Louisana, Blackat Press, 2007.
24. F. Martin and K. B. Anthony, Digital media for learning. Digital Media for Learning., 2019.
25. Y. D. Kim, "A design methodology using prototyping based on the digital-physical models in the architectural design process," Sustainability, vol. 11, no. 16, p. 4416, 2019.
26. M. M. Hasan, E. Ahmed and F. M. Hossain, "Developing Network Security-Enhanced Model for an Enterprise Network.," 2019.
27. S. Berg Hestvedt and M. Raae Stedje, "Awareness of Non-functional Requirements in Agile Software Projects," Master's thesis, Høyskolen Kristiania, 2020.
28. P. C. P. BHATT, SOFTWARE DESIGN, ARCHITECTURE AND ENGINEERING: CONCEPTS AND PRACTICE., PHI Learning Pvt. Ltd., 2021.
29. L. Jacobson and J. R. G. Booch, "The unified modeling language reference manual.," 2021.
30. D. Schmalen, Security Concept for VPN IPsec Site-to-Site Connections to Third Parties, California State University, Long Beach, 2018.