TAILIEUCHUNG - Distributed Network Security

The grid environment is highly distributed. An area where current application software requirements and their usage patterns can be misaligned with site security policies is an assumption of the availability of IP network connectivity from anywhere to anywhere. The result of this assumption can be a weakening of site network access control measures and consequent increased likelihood of sites being subject to network attacks from the outside or being used as the source of an outbound attack on a third party. The latter case would be particularly severe if a distributed denial of service attack were to be mounted from. | Distributed Network Security . Oliver Welter . Andreas Pilz Technische Universitaet Muenchen welter@ Abstract IP-based networks form the base of todays communication infrastructure. The interconnection of formerly isolated networks brings up severe security issues. The standard approach to protect the own network from abuse is the usage of filter mechanisms at the border to the foreign network. The raising complexity of protocols and the use of encryption techniques render most of these border-oriented systems useless as their are not able to track or analyze the transfered data. The approach discussed in this article splits into three parts - first we invent distributed sensors which enlarge the amount of data available for analysis by accessing information directly at its source. To integrate these into the classic border oriented system we create an abstract interface and management system based on the Common Information Model. Finally we will divide the management system itself into independent components distribute them over the network and gain significant increase of performance. 1. Topical security systems The interconnection of formerly private and isolated communication networks enables new forms of services and applications but brings also new threats and the need for appropriate defense mechanisms. Until today most networks are secured by firewalls which apply IP-packet-filtering at the interface between the internal and the external network. This raises two major problems First as traffic is allowed or denied only based on IP-packet information it is impossible to associate traffic to certain applications or process on the client machines in the internal network. If a client is infected by malicious software collecting and sending information to an outside attacker . through the standard HTTP port the firewall may identify this as allowed traffic to a webpage server and hence allows the packets to leave the network. On the .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.