Inside risks: a risks-related bookshelf
Communications of the ACM
Fast and scalable layer four switching
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Mobile Networks and Applications - Special issue: mobile networking in the Internet
Packet classification using tuple space search
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Linux Journal
Secure Execution of Java Applets Using a Remote Playground
IEEE Transactions on Software Engineering
Associating network flows with user and application information
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Computer Networks: The International Journal of Computer and Telecommunications Networking
BT Technology Journal
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Transport-Level Proxy for Secure Multimedia Streams
IEEE Internet Computing
Interval Weighted Load Balancing Method for Multiple Application Gateway Firewalls
ICCS '02 Proceedings of the International Conference on Computational Science-Part III
SWAT '00 Proceedings of the 7th Scandinavian Workshop on Algorithm Theory
A Unified Methodology for Verification and Synthesis of Firewall Configurations
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Redundant Data Acquisition in a Distributed Security Compound
SAFECOMP '02 Proceedings of the 21st International Conference on Computer Safety, Reliability and Security
Xaba: Exact, Approximate, and Asymptotic Solvers for Multi-class Closed Queueing Networks
TOOLS '00 Proceedings of the 11th International Conference on Computer Performance Evaluation: Modelling Techniques and Tools
Blocking Java Applets at the Firewall
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Cascade of Distributed and Cooperating Firewalls in a Secure Data Network
IEEE Transactions on Knowledge and Data Engineering
Active security management based on secure zone cooperation
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Protocol scrubbing: network security through transparent flow modification
IEEE/ACM Transactions on Networking (TON)
Firmato: A novel firewall management toolkit
ACM Transactions on Computer Systems (TOCS)
A Secure and Transparent Firewall Web Proxy
LISA '03 Proceedings of the 17th USENIX conference on System administration
Introducing computer security concepts in introductory computer science courses
Journal of Computing Sciences in Colleges
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
Defeating TCP/IP stack fingerprinting
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Securing 'classical IP over ATM networks'
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Just type make! - managing internet firewalls using make and other publicly available utilities
NETA'99 Proceedings of the 1st conference on Conference on Network Administration - Volume 1
Tricks you can do if your firewall is a bridge
NETA'99 Proceedings of the 1st conference on Conference on Network Administration - Volume 1
A formal logic approach to firewall packet filtering analysis and generation
Artificial Intelligence Review
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Design of secure monitor in the secure zone cooperation
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
A firewall approach to personal knowledge system
CBMS'03 Proceedings of the 16th IEEE conference on Computer-based medical systems
Adversarial security: getting to the root of the problem
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
The design of secure node system based on integrated security engine (SNSISE)
CIMMACS'05 Proceedings of the 4th WSEAS international conference on Computational intelligence, man-machine systems and cybernetics
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
AEGIS: a lightweight firewall for wireless sensor networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Data protection based on physical separation: concepts and application scenarios
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Tutorial: Internet/Intranet firewall security-policy, architecture and transaction services
Computer Communications
Towards global collaboration tools
CHINZ '03 Proceedings of the 4th Annual Conference of the ACM Special Interest Group on Computer-Human Interaction
Information Systems and e-Business Management
Hi-index | 0.02 |
From the Publisher:More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images.Everyone is jumping on the Internet bandwagon. Once a havenfor academicians and scientists, the Net is now reaching large andsmall businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net.What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system fromthese Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution thatrestricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts:Part I discusses Internet threats, the benefits of firewalls, overallsecurity strategies, and a summary of Internet services and theirsecurity risks. Part II describes possible firewall designs and general terms andconcepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall.Part III describes how to maintain a firewall, develop a securitypolicy, and respond to a security incident.Part IV contains appendices consisting of a resource summary, adirectory of how to find firewall toolkits and other security-relatedtools, and a detailed summary providing TCP/IP background information.