{"title":"Algorithm for identifying clients based on dynamic MAC addresses in narrowly targeted secure networks using deep learning neural networks","authors":"A. Tyutyunnik, E. Lobaneva, A. Lazarev","doi":"10.1080/17445760.2021.1941007","DOIUrl":null,"url":null,"abstract":"Existing algorithms for identifying clients on a network segment are based on static client binding by MAC address. MAC address generation is based on pseudo-random sequences of 0–256 characters. With this feature in mind, software was developed based on an algorithm for generating MAC addresses using bidirectional neural networks, followed by integration of a decision support system module. A secondary feature of the developed software is the ability to set a MAC validity timeout, which will limit access to the network segment and increase the security factor.","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":"36 1","pages":"470 - 481"},"PeriodicalIF":0.6000,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/17445760.2021.1941007","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Parallel Emergent and Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/17445760.2021.1941007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Existing algorithms for identifying clients on a network segment are based on static client binding by MAC address. MAC address generation is based on pseudo-random sequences of 0–256 characters. With this feature in mind, software was developed based on an algorithm for generating MAC addresses using bidirectional neural networks, followed by integration of a decision support system module. A secondary feature of the developed software is the ability to set a MAC validity timeout, which will limit access to the network segment and increase the security factor.