zations all over the world adopted telecommuting to
reduce the risk of employee virus infection. Orga-
nizations were forced to construct the environments
of the telecommuting quickly, therefore, many or-
ganizations adopted stopgap ways, e.g., employees
are forced to connect their organization’s network via
VPN.. In such cases, the security level may reduce
even if the separated network is constructed because
the client terminals running the remote desktop may
not secure.
To ensure the security of the organization network,
we have to dynamically change the access controls
based on the situation of the users not only on the
necessity of the communication. In other words, we
need to control the intensity of the access controls
based on the situation. For example, we should re-
strict the communication by a user according to the
situation of the user even if the communication is
judged as necessary and permitted in the ordinary sit-
uation. However, it is difficult for network adminis-
trators to conduct such dynamic access controls.
Therefore, this paper proposes a dynamic access
control system based on the situation of users. The
system limits the communication according to the risk
of a user and the importance of accessible resources.
The system makes us possible to control access cor-
responding to various situations of the organization’s
employees and maintain the security of the networks
even if the way of working changes.
The rest of this paper is organized as follows: In
Section II, we introduce related works. Section III
presents the proposal system. In Section IV, we dis-
cuss the effectiveness of our proposed system. Fi-
nally, we conclude this paper in Section V.
2 RELATED WORKS
Because the separated network is effective in sup-
pressing malware activities, many research works
have done to construct separated networks.
Watanabe et al. proposed a VLAN configuration
method(Watanabe et al., 2005). In this method, they
focused on the frequency of communications. When a
certain amount of traffic among terminals is observed,
such terminals are coordinated into the same VLAN.
Nayak et al. proposed Resonance(Nayak et al.,
2009) that is a framework of dynamic access controls
based on the security policy. It also based on real-time
monitoring, and it can isolate suspicious terminals.
As the system proposed by Tian et al. (Tian et al.,
2019), Jinjing can read the network operator’s inten-
tion and update network ACL configuration automat-
ically.
In our previous work, we proposed the system
supporting the construction of the separated network.
The system refers to the employees’ human resource
information and their access authorities to resources
in the organization, and it generates access con-
trols based on the collected information automati-
cally. Moreover, to increase the accuracy of the access
control, the system also refers to the network traffic to
judges the necessity of the communication.
However, these researches focus on preventing
unnecessary or malicious communications, therefore,
the communication judged as necessary is always per-
mitted in the network. For example, although our
previous system can follow the personnel changes or
changes of access authorities and can dynamically up-
date the access controls because it automatically gen-
erates access controls based on the collected informa-
tion, the system always permits necessary communi-
cation.
On the other hand, as described in Section 1, we
need flexible access controls according to the user’s
situation. There are many researches of constructing
secure network for the Internet of Things (IoT) (At-
lam et al., 2017)(Rath and Colin, 2017). The recent
network situation, in which telecommuting forces al-
most every user to connect to the resources from the
external network, is an unexpected structure in con-
ventional networks. As with the IoT network, we
need a new construction method of the secure net-
work from the different viewpoint of conventional
networks.
In recent years, methods of network configuration
have been improving. As one of such methods, Soft-
ware Defined Networking (SDN) is often studied. As
Nguyen and Kim proposed(Nguyen and Kim, 2016),
we can flexibly manage a large scale network, e.g.,
campus networks, by using SDN technics. By using
such methods, we can configure the network flexibly.
Therefore, we propose the method to judges the per-
mission of users according to the situation.
3 PROPOSED SYSTEM
In this paper, we propose a dynamic access control
system based on the situation of users. When a user
connects to the internal network from the outside net-
work via the internet, the system dynamically assigns
the ACL different from the usual ACL.
3.1 Assumption
First of all, the proposed system assumes a network
that is separated into several segments and managed
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
654