Network security: private communication in a public world
Network security: private communication in a public world
Building Internet Firewalls
Hacking Exposed; Network Security Secrets and Solutions
Hacking Exposed; Network Security Secrets and Solutions
Information Security Management Handbook
Information Security Management Handbook
Active Network Based DDoS Defense
DANCE '02 Proceedings of the 2002 DARPA Active Networks Conference and Exposition
Applying Trust Policies for Protecting Mobile Agents Against DoS
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Lightweight agents for intrusion detection
Journal of Systems and Software
Active networks: Applications, security, safety, and architectures
IEEE Communications Surveys & Tutorials
Safety and security of programmable network infrastructures
IEEE Communications Magazine
Active networks for efficient distributed network management
IEEE Communications Magazine
Access control management for ubiquitous computing
Future Generation Computer Systems
An approach based on citation analysis to support effective handling of regulatory compliance
Future Generation Computer Systems
A comprehensive vulnerability based alert management approach for large networks
Future Generation Computer Systems
Hi-index | 0.00 |
Due to its open protocol, the Internet has revolutionized computer networks, but this revolution brings new risks and threats. The best way to protect computer networks is to prevent attackers from intruding, using fast automated procedures. However, the current state of protection is insufficient, because providing for all attacks or preventing unknown types of attack is almost impossible, and the methods used are manual. We solve this problem by using active security management, based on sharing information about attacks and cooperation between organizations. Secure Zone Cooperation, a framework that establishes mutual collaboration and cooperation between trusted zones, can protect systems and networks from potential attacks. This framework can predict and respond to attacks by exchanging security information and cooperating with each zone. It is a dynamic, powerful security architecture that rapidly enables security policy to be updated and response modules to be deployed.