IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Building Internet firewalls (2nd ed.)
Building Internet firewalls (2nd ed.)
Intrusion detection
Protecting the Hosted Application Server
WETICE '99 Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Intrusion Detection System: Technology and Development
AINA '03 Proceedings of the 17th International Conference on Advanced Information Networking and Applications
Firewalls and Internet Security: Repelling the Wily Hacker
Firewalls and Internet Security: Repelling the Wily Hacker
Implementing the Intrusion Detection Exchange Protocol
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Ethernet Wrapper: Extension of the TCP Wrapper
ICPADS '01 Proceedings of the Eighth International Conference on Parallel and Distributed Systems
Practical Unix & Internet Security, 3rd Edition
Practical Unix & Internet Security, 3rd Edition
Hi-index | 0.00 |
A number of defensive technologies have been proposed for the prevention of security threats. However, these defensive technologies are implemented independently without cooperation among various network domains. In this paper, different administrative networks are leagued to form a federative network environment called a trusted domain. From the perspective of a network manager, there is a need to integrate diverse technologies into an effective defensive system among mutually trusted domains. An imperative task for security management is to put in place a shared defensive mechanism, or protective shield, for multiple domains. A cooperative approach to provide such a shared defensive system is presented with integration of both intra-domain and inter-domain defensive mechanisms. The simulation results show that, through sharing the defensive information, the firewall system can successfully detect and filter the repeated intrusions.