Skip to main content

Design of Secure Monitor in the Secure Zone Cooperation

  • Conference paper
  • First Online:
  • 669 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2668))

Abstract

We propose a Secure Zone Cooperation to protect unknown types of attack and to improve efficiency of security systems. The Secure Zone Cooperation, a framework that establishes mutual collaboration and cooperation between trusted zones, can protect systems and networks from potential attacks. This framework can predict and respond to attacks by exchanging security information and cooperating with each zone. A Secure Monitor plays a major role in detecting security events in the Secure Zone Cooperation, so its ability is a key factor that represents the safety of the Secure Zone. In this paper, we introduce the design of the Secure Monitor.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. B. Chang, D. Kim, Y. Kwon, T. Nam, T. Chung, Security management by zone cooperation in active network environment, in: Proceedings of the 2002 International Conference on Security and Management (SAM’02), Las Vegas, USA, 2002, pp. 187–192.

    Google Scholar 

  2. B. Cubaleska, M. Schneider, Applying trust policies for protecting mobile agents against DoS, in: Proceedings of the Third IEEE International Workshop on Policies for Distributed Systems and Networks, Monterey, USA, 2002, pp. 198–201.

    Google Scholar 

  3. D. Chapman, D. Zwicky, Building Internet Firewalls, O’Reilly & Associates, Inc., 1996.

    Google Scholar 

  4. S. Harris, Denying Denial-of-Service, Information Security Magazine, Sept. 2001, http://www.infosecuritymag.com/articles/september01/cover.shtml.

  5. K. Houle, G. Weaver, Trends in Denial of Service v1.0, Report of the CERT/CC, Oct. 2001, http://www.cert.org/archive/pdf/DoS_trends.pdf.

  6. G. Helmer, J. Wong, V. Honavar, L. Miller, Lightweight agents for intrusion detection, Submitted to the Journal of Systems and Software, Iowa State University, Nov. 2000, http://latte.cs.iastate.edu/~ghelmer/NewFacets.ps.

  7. C. Kaufman, R. Perlman, M. Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall PTR, 1995.

    Google Scholar 

  8. S. McClure, J. Scambray, G. Kurtz, Hacking Exposed-Network Security Secrets & Solu-tions, McGraw-Hill Companies, 1999.

    Google Scholar 

  9. D. Sterne, K. Djahandari, R. Balupari, W. Cholter, B. Babson, B. Wilson, P. Narasimhan, A. Purtell, D. Schnackenberg, S. Linden, Active network based DDoS defense, in: Proceedings of the DARPA Active Networks Conference and Exposition (DANCE’02), San Francisco, CA, 2002, pp. 193–203.

    Google Scholar 

  10. R. Venkateswaran, Virtual private networks, IEEE Potentials, Vol. 20,No. 1, Feb-March 2001, pp. 11–15

    Article  Google Scholar 

  11. Kemmerer, R.A., Vigna, G., Intrusion detection: a brief history and overview, Computer, Volume:35, Issue:4, supl27–supl30,April 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahn, G., Chang, B., Chung, T.M. (2003). Design of Secure Monitor in the Secure Zone Cooperation. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds) Computational Science and Its Applications — ICCSA 2003. ICCSA 2003. Lecture Notes in Computer Science, vol 2668. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44843-8_34

Download citation

  • DOI: https://doi.org/10.1007/3-540-44843-8_34

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40161-2

  • Online ISBN: 978-3-540-44843-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics