CREATION OF A SEAMLESS WIRELESS NETWORK TO PROVIDE SECURE ACCESS TO THE ELEARNING SYSTEM OF THE UNIVERSITY
CREATION OF A SEAMLESS WIRELESS NETWORK TO PROVIDE SECURE ACCESS TO THE ELEARNING SYSTEM OF THE UNIVERSITY
Author(s): Andrey Martynov, Maksim UIMIN, Alexey MITKOVSKIY, Andrey PROLETARSKIYSubject(s): Higher Education , ICT Information and Communications Technologies, Distance learning / e-learning
Published by: Carol I National Defence University Publishing House
Keywords: Wireless network; authentication server; SIEM; network security; authorized access; Wi-Fi;
Summary/Abstract: Most modern universities have an extensive wired LAN to provide students with access to various network resources within the institution. This limits the types of devices used (e.g. telephones or tablets do not have an integrated Ethernet port), restricts movement around the building (the user cannot move far away from the wire that connects to the network), and makes it difficult to design classrooms with a network connection, as it is necessary to consider the cables that need to be laid to connect personal computers to the university network. The best way to solve this problem is to use wireless networking technologies. The article is devoted to the design of a wireless network. The first issue to be considered is the process of reconnecting the device to the wireless network when moving it in space (seamless network) with the preservation of an authorized session. Network construction presupposes the presence of a single access controller and a set of distributed thin access points. An important stage of the design will be the organization of the authentication server (e.g. Radius-server) taking into account the peculiarities of its operation in seamless networks. The next stage is the creation of an appropriate security system and audit of the university network infrastructure. The article proposes to use the Security information and event management (SIEM) class system to detect network attacks, abnormal traffic and audit internal connections and resources. The attack detection methodology will be built on the technology of correlation of disparate data to detect suspicious behaviour.
Journal: Conference proceedings of »eLearning and Software for Education« (eLSE)
- Issue Year: 16/2020
- Issue No: 02
- Page Range: 407-412
- Page Count: 6
- Language: English