The term “protect” is versatile. It implies the integrity and confidentiality of customer’s data, protection from the degradation of network services (due to e.g. DDoDs) etc.Spurred by the rapid evolution of networking technologies, weare witnessing the enormous growth of Internet throughput and a shift from the fixed client devices towards mobile devices(since 2003 the number networked devices, sensors etc. exceedthe number of PCs. We had over 1 billion connected smartphones already in early 2013, and only about 200 millionfixed devices). At the same ti me the efficiency of existing
access control solutions is reduced
[11, 12]. In terms of client
device mobility, network configurations are changing rapidly
and the information on network topology changes can no
longer be used directly for acce
ss control. So the problem of
network access control based on
the information about the
expected behavior of network applications (flows) is becoming
more and more important