Implementing a distributed firewall
Proceedings of the 7th ACM conference on Computer and communications security
Mobile agents with Java: The Aglet API
World Wide Web
Security Issues in Mobile Code Systems
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Security agility in response to intrusion detection
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Firewall placement in a large network topology
FTDCS '97 Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computing Systems
Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection
NCA '01 Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA'01)
A smart IDS and response system for the internet malicious worm
International Journal of Wireless and Mobile Computing
A stateful CSG-based distributed firewall architecture for robust distributed security
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
The stateful cluster security gateway (CSG) architecture for robust switched Linux cluster security
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
A multi-agent cooperative model and system for integrated security monitoring
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Hi-index | 0.00 |
We propose a distributed multi-level architecture to solve the Intranet security problem. The basic idea is to build micro firewalls on all hosts in the Intranet, as a second line of defense behind the gateway firewall. A distributed intrusion detection system (IDS) is developed to achieve proactive intrusion responses with dynamic policy changes. Mobile agents, CORBA,and RMI are evaluated for dynamic policy update. We find that mobile agents are most scalable and robust for policy update, but prone to attacks by other agents and hosts. CORBA has the best speed performance. The Java-based RMI has the highest security based onthe sandbox model. Key concepts, preliminary results, and continued research challenges are presented.