Review on Internet Usage Control Using Access Control Techniques

Authors

  • R. Sangeetha  Assistant Professor, Department of Information Technology, Hindusthan College of Arts and Science, Coimbatore, Tamil Nadu, India

Keywords:

Network Traffic, Network Security, Protocols, Standard ACL, Extended ACL

Abstract

The contact list is a group of statements. Each statement defines a pattern that would be found in an IP packet. As each packet comes through an interface with an associated access list, the list is scanned from top to bottom in the exact order that it was entered—for a pattern that matches the incoming packet. Access list criteria could be the source address of the traffic, the destination address of the traffic, the upper-layer protocol, or other information .Cisco provides basic traffic filtering capabilities with access control lists .Access lists can be configured for all routed network protocols (IP, AppleTalk, and so on) to filter the packets of those protocols as the packets pass through a router. When creating an access list, you define criteria that are applied to each packet that is processed by the router; the router decides whether to forward or block each packet on the basis of whether or not the packet matches the criteria. Typical criteria you define in access lists are packet source addresses, packet purpose addresses, and upper-layer protocol of the packet. However, each protocol has its own specific set of criteria that can be clear. For a single access list, you can define multiple criteria in multiple, separate access list statements. Each of these statements should reference the same identifying name or number, to tie the statements to the same access list. You can have as many criteria statements as you want, limited only by the available memory. Of course, the more statements you have, the more hard it will be to comprehend and manage your access lists. Placement and understanding of the traffic flow is important to understand up front before you configure an ACL on a router interface.

References

  1. MAdFraud: Investigating Ad Fraud in Android Applications.
  2. Mining Personal Context-Aware Preferences for Mobile Users.
  3. A Flexible Generative Model for Preference Aggregation.
  4. Opinion spam and analysis. In Proceedings of the 2008 International Conference on Web Search and Networking, WSDM ’08, pages 219-230, 2008.
  5. M. Blei, A. Y. Ng, and M. I. Jordan. Lantent dirichlet allocation. Journal of Machine Learning Research, pages 993-1022, 2003.
  6. Ge, H. Xiong, C. Liu, and Z.-H. Zhou. A taxi driving fraud detection system. In Proceedings of the 2011 IEEE 11th International Conference Neural Networks, ICNN ’11, pages 181-190, 2011.
  7. Spirin and J. Han, "Survey on web spam detection: Principles and algorithms," SIGKDD Explor. Newslett., vol. 13, no. 2, pp. 50-64, May2012.
  8. -P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw, "Detecting product review spammers using rating behaviors," in Proc.19thACMInt. Conf. Inform. Knowl. Manage., 2010, pp. 939-948.
  9. Dzwinel et al Non multidimensional scaling and visualization of earth quake cluster over space and feature space, nonlinear processes in geophysics 12[2005] pp1-12.
  10. Lomnitz. Fundamentals of Earthquake prediction [1994].
  11. Gutenberg & C.H. Richtro, Earthquake magnitude, intensity, energy & acceleration bulseism soc. Am 36, 105-145 [1996].
  12. Brunk, J.Kelly & Rkohai "Mineset An integrate system for Visual Data Mining" 1997.
  13. http://www.dotnetspider.com.
  14. Xia Qianfang and Ye Xiaohua;National Media Coverage of SARS Crisis (February to May 2003)[J];Journalism & Communication;2003-02.
  15. Tian Weiguang and Li Xiguang;Political Bias of Media Coverage on China SARS by the US Media[J];Journalism & Communication;2003-02

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
R. Sangeetha, " Review on Internet Usage Control Using Access Control Techniques, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1045-1051, January-February-2018.