Proceedings of the 46th Annual Southeast Regional Conference on XX 2008
DOI: 10.1145/1593105.1593162
|View full text |Cite
|
Sign up to set email alerts
|

A distributed firewall and active response architecture providing preemptive protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inability to completely trust insiders of the network. Distributed firewalls are designed for alleviating these limitations [7].…”
Section: Cyber-security Protection Methodsmentioning
confidence: 99%
“…However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inability to completely trust insiders of the network. Distributed firewalls are designed for alleviating these limitations [7].…”
Section: Cyber-security Protection Methodsmentioning
confidence: 99%
“…A source IP address and a destination IP address are basic information to generate a firewall rule. The firewall rules remain constant unless there is an explicit need to change the policy as a result the firewall cannot adapt to real-time threats [18]. Any system that uses predetermined and fixed IPs might impose some limitation on the dynamism and the scalability of IaaS [19].…”
Section: Security Challenges Of Infrastructure As a Servicementioning
confidence: 99%
“…The firewall virtualisation allows dynamic deployment, so it suits IaaS characteristics and it can effectively improve firewall configuration [59,61]. Most of the academic research assumes that the insiders in cloud service providers are not trusted [1,18,44]. To improve the trust in the cloud environment, a bridge virtual firewall can be designed and installed on the virtual machine in IaaS so that the cloud user can have full control on their firewall [44].…”
Section: Iaas Firewall Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Kheir et al (2009) minimal cost of responseThames et al (2008) firewallZhang et al (2003) logs the attack data for forensicsFigure 2.1 Code red attack is blocked successfully Figure 2.2 Code red attack succeeds Surveys such as Stakhanova et al (2007); Shameli-Sendi et al (2012); Anuar et al (2010)…”
mentioning
confidence: 99%