Active security management based on secure zone cooperation
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Design of secure monitor in the secure zone cooperation
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
An extensible and flexible system for network anomaly detection
AN'06 Proceedings of the First IFIP TC6 international conference on Autonomic Networking
DDoS avoidance strategy for service availability
Cluster Computing
Hi-index | 0.00 |
Prior research on active networks has outlined avision of broad applicability.We present rationale andtechniques for applying active network concepts andtechnology to the automated intrusion response problemdomain, and in particular, automated defense againstdistributed denial-of-service (DDoS) attacks.We describeour experience exploring these ideas via prototypingusing the Secure ANTS execution environment in adeployment scenario that requires active programs tomigrate across network administration boundaries.Fromthis experience, observations are drawn on the suitabilityof active networks for this problem domain.