A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification

International Journal of Computer Trends and Technology (IJCTT)
© 2014 by IJCTT Journal
Volume-15 Number-2
Year of Publication : 2014
Authors : Ako Muhammad Abdullah , Miran Hikmat Mohammed Baban , Roza Hikmat Hama Aziz
DOI :  10.14445/22312803/IJCTT-V15P119


Ako Muhammad Abdullah , Miran Hikmat Mohammed Baban , Roza Hikmat Hama Aziz. "A New Approaches to Improve Server Secuirty by Using Media Access Control Address Verification". International Journal of Computer Trends and Technology (IJCTT) V15(2):83-87, Sep 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
A Local Area Network (LAN) is usually privately owned and links the devices in a single office, building, or campus. Currently, LAN has been widely used in the different fields. Depending on the requirements of an organization and the kinds of technology used, a LAN can be extended throughout a company or institutions and include voice, images, texts, and videos peripherals. Security in a local area network comprises of the provisions and policies adopted by a network administrator to monitor and prevent unauthorized access, modification, misuse or denial of a computer network and network accessible resources. Network security covers a variety of computer networks, both private and public, that are utilized in everyday job conducting transactions and communications among government agencies, individuals and business. Network can be private, such as within an institutions and company. The most common and simple way of protecting a network resource on server is by assigning a unique name and corresponding password for clients to access a server to get information. In this paper, we propose a new approach to improve server security in a local area network by checking MAC address when the clients want to access the server. The system has been designed to deal with low security level on the server. To do that different testing has been implemented on the system to identify the improving security on the server. The experiments result show that the new security method is efficiency and accuracy in improving the security on the server and the method can effectively deal with clients to access the server in a local area network.

[1] Espiritu, R., Local Area Network (LAN) Compatibility Issues, Thesis, Naval Postgraduate School, United State, 2011.
[2] Dye, M., McDonald, R. and Rufi, A., Network fundamentals, 1st ed. Indianapolis, Ind.: Cisco Press, 2008.
[3] Forouzan, B., Coombs, C. and Fegan, S., Data communications and networking. 1st ed. Boston: McGraw-Hill, 2001.
[4] Vacca, J., Network and system security, 1st ed. Amsterdam: Syngress, 2014.
[5] Franklin, M., Crowley, P., Hadimioglu, H. and Onufryk, P., Network Processor Design. 1st ed. Burlington: Elsevier, 2002.
[6] Singh, G., Security Issues in Wireless Local Area Networks (WLAN), Global Journal of Science Frontier Research Mathematics and Decision Sciences, Vol. 12, Issue 11, pp.1-12, 2012.
[7] Archana, H. and Gauri, V., Media Access Control Spoofing Techniques and its Counter Measures, International Journal of Scientific & Engineering Research, Vol. 2, Issue 6, pp.1-5, 2012.
[8] Fu, K., Sit, E., Smith, K. and Feamster, N., The Dos and Don`ts of Client Authentication on the Web, in Proceedings of the 10th USENIX Security Symposium. Washington, D.C., pp.251--268., 2001.
[9] Hess, A., Jacobson, J., Mills, H., Wamsley, R., Seamons, K. and Smith, B., Advanced Client/Server Authentication in TLS, Computer Science Department, Brigham Young University, pp. 1-12, 2002.
[10] Nguyen, H. (2001), Testing applications on the Web, 1st ed. New York: Wiley.
[11] Manju, K. (2014), Human Resource Management Systems HRMS, [Online] Scribd.com. Available at: http://www.scribd.com/doc/53922861/Human-Resource-Management-Systems-HRMS [Accessed 15 Jun. 2014].
[12] Shakya, H., Report of Online Banking System, Department of Information & Technology, Pajasthan Technical University, India, pp.1-70, 2012.
[13] Kumar, V. (2012), Implementation of Eccentric Network for Intranet, [Online] Scribd.com. Available at: http://www.scribd.com/doc/118093298/Eccentric-Network-for-Intrnet [Accessed 12 May. 2014].
[14] Ramesh, K., Babu. B and Prakash, G. ,Scalable Technique of Cryptographic Key in Supervision for Essential to the Success of Wireless Improvised Networks, International Journal of Engineering Research and Development, Vol. 5, Issue 2, pp. 14-19, 2012.
[15] Odagiri, K., Shimizu, S., Ishii, N. and Takizawa, M., Principle of Virtual Use Method in Common Gateway Interface Program on the DACS Scheme, International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.1, pp.147-161 ,2012.

Local Area Network, Server, Media Access Control Address (MAC Address), Common Gateway Interface, Database Server, Authentication