[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1593105.1593162acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

A distributed firewall and active response architecture providing preemptive protection

Published: 28 March 2008 Publication History

Abstract

Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inability to completely trust insiders of the network. Distributed firewalls are designed for alleviating these limitations. Intrusion detection is a mature technology and is very powerful when coupled with active response, which is the act of responding to intrusions without the need of human advisory. This paper describes an architecture that implements a distributed firewall with distributed active response. A fundamental result of the architecture is that it can provide proactive and preemptive security for hosts that deploy the system. Using the open-source software framework, the software implementing this proposed system will be provided to the research community so that the architecture can be extended by other researchers and so that newcomers to network security can start investigating security concepts quickly.

References

[1]
Axelsson, S., Intrusion Detection Systems: A Survey and Taxonomy, Technical Report, pp. 99--115, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, March 2000
[2]
Bellovin, S. M., Distributed Firewalls,; login:, Vol. 24, pp. 37--47, November 1999
[3]
Ioannidis, S., Keromytis, A. D., Bellovin, S. M., Smith, J. M., Implementing a Distributed Firewall, In Proceedings of Computer and Communications Security (2000), CCS'00 pp. 190--1999
[4]
Smith, R., Chen, Y., Bhattacharya, S., Cascade of Distributed and Cooperating Firewalls in a Secure Data Netwrok, IEEE Transactions on Knowledge and Data Enginnering, Vol. 15, NO. 5, pp. 1307--1315, 2003
[5]
Zou, C., Towsley, D., Weibo, G., A Firewall Network System for Worm Defense in Enterprise Networks, Technical Report: TR-04-CSE-01, University of Massachusetts, Amherst, 2004
[6]
Iptables Firewall, http://www.netfilter.org/
[7]
SNORT IDS, http://www.snort.org/

Cited By

View all
  • (2024)A Systematic Mapping Study on Intrusion Response SystemsIEEE Access10.1109/ACCESS.2024.338199812(46524-46550)Online publication date: 2024
  • (2022)Conventional and next generation firewalls in network security and its applications2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)10.1109/ICCCIS56430.2022.10037674(964-969)Online publication date: 4-Nov-2022
  • (2020)Security and Privacy Implementation Framework as a Result of the Digitalization Process for Organizations in Different IndustriesInnovation in Sustainable Management and Entrepreneurship10.1007/978-3-030-44711-3_4(41-51)Online publication date: 30-May-2020
  • Show More Cited By

Index Terms

  1. A distributed firewall and active response architecture providing preemptive protection

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ACMSE '08: Proceedings of the 46th annual ACM Southeast Conference
    March 2008
    548 pages
    ISBN:9781605581057
    DOI:10.1145/1593105
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 March 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. active intrusion response
    2. distributed firewalls
    3. intrusion detection systems

    Qualifiers

    • Research-article

    Conference

    ACM SE08
    ACM SE08: ACM Southeast Regional Conference
    March 28 - 29, 2008
    Alabama, Auburn

    Acceptance Rates

    Overall Acceptance Rate 502 of 1,023 submissions, 49%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Systematic Mapping Study on Intrusion Response SystemsIEEE Access10.1109/ACCESS.2024.338199812(46524-46550)Online publication date: 2024
    • (2022)Conventional and next generation firewalls in network security and its applications2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)10.1109/ICCCIS56430.2022.10037674(964-969)Online publication date: 4-Nov-2022
    • (2020)Security and Privacy Implementation Framework as a Result of the Digitalization Process for Organizations in Different IndustriesInnovation in Sustainable Management and Entrepreneurship10.1007/978-3-030-44711-3_4(41-51)Online publication date: 30-May-2020
    • (2018)Distributed and Cooperative firewall/controller in cloud environmentsProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3230857(1-10)Online publication date: 27-Aug-2018
    • (2016)Infrastructure as a service: Exploring network access control challenges2016 SAI Computing Conference (SAI)10.1109/SAI.2016.7556042(596-603)Online publication date: Jul-2016
    • (2013)Firewall model for cloud computing2013 IEEE 8th International Conference on Industrial and Information Systems10.1109/ICIInfS.2013.6731960(86-91)Online publication date: Dec-2013
    • (2012)Graphical passwordsACM Computing Surveys10.1145/2333112.233311444:4(1-41)Online publication date: 7-Sep-2012
    • (2008)Work in progress - mentoring undergraduate students preparing for graduate study in engineering-a CREATE case study2008 38th Annual Frontiers in Education Conference10.1109/FIE.2008.4720664(F4F-12-F4F-13)Online publication date: Oct-2008

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media