Abstract
This article presents a security system proposal, providing a low-level endpoint security and network activity monitoring. Its focus is to provide a necessary information for local administrators, who does not necessarily have the knowledge of networking infrastructure or access to it, according to the security policies of a parent organization. This paper presents a system designed for academic research environments, where it serves as a tool for an extended security in protection of sensitive data used in research and development against the local and remote threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Greenwald, M., Singhal, S.K., Stone, J.R., Cheriton, D.R.: Designing an academic firewall: policy, practice, and experience with SURF. In: Network and Distributed System Security, pp. 79–92, February 22–23, 1996
Moon, C.-S., Kim, S.-H.: A study on the integrated security system based real-time network packet deep inspection. International Journal of Security and its Applications 8, 113–122 (2014)
Hamelin, M.: Preventing firewall meltdowns. Network Security 2010(6), 15–16 (2010). doi:10.1016/S1353-4858(10)70083-0
Hamed, H., Al-Shaer, E.: Dynamic rule-ordering optimization for high-speed firewall filtering. In: ASIACCS 2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 332–342 (2006). doi:10.1145/1128817.1128867
Mishra, A., Agrawal, A., Ranjan R.: Artificial Intelligent Firewall. In: ACAI 2011 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, pp. 204–207 (2011). doi:10.1145/2007052.2007094
Dubrawsky, I.: Firewall Evolution - Deep Packet Inspection. Infocus (July 2003)
Zhang, R., Qian, D., Ba, C., Wu, W., Guo, X.: Multi-agent based intrusion detection architecture. In: Computer Networks and Mobile Computing, pp. 494–501 (2001)
Dilley, J.A., Laghate, P., Summers, J., Devanneaux, T.: Cloud Based Firewall System And Service (2015). US Patent No.: 20150089582
Wool, A.: Trends in firewall configuration errors: Measuring the holes in swiss cheese. IEEE Internet Computing 14(4), 58–65 (2010)
Beardsley, T., Qian, J.: The TCP Split Handshake: Practical Effects on Modern Network Equipment. Network Protocols and Algorithms 2 (2010)
Butler, D.L., Winne, P.H.: Feedback and Self-Regulated Learning: A Theoretical Synthesis. Review of Educational Research 65(3), 245–281 (1995). doi:10.3102/00346543065003245
Vaarandi, R.: Simple Event Correlator for real-time security log monitoring. Hakin9 Magazine 1(6), 28–39 (2006)
Manolache, F.B., Hou, Q., Rusu, O.: Analysis and prevention of network password guessing attacks in an enterprise environment. In: RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference, pp. 1–7, September 11–13, 2014
Waldvogel, M., Kollek, J.: SIEGE: Service-Independent Enterprise-GradE protection against password scans (2014)
Czajkowski, G., Daynès, L.: Multitasking without compromise: a virtual machine evolution. In: Proceedings of the 16th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications, vol. 36(11), pp. 125–138 (2001). doi:10.1145/504282.504292
He, A., Chomsiri, T., Nanda, P., Tan, Z.: Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems 30, 116–126 (2014)
Cimler, R., Matyska, J., Sobeslav, V.: Cloud based solution for mobile healthcare application. In: Proceedings of the 18th International Database Engineering & Applications Symposium on - IDEAS 2014. doi:10.1145/2628194.2628217
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Balik, L., Horalek, J., Hornig, O., Sobeslav, V., Dolezal, R., Kuca, K. (2015). Endpoint Firewall for Local Security Hardening in Academic Research Environment. In: Núñez, M., Nguyen, N., Camacho, D., Trawiński, B. (eds) Computational Collective Intelligence. Lecture Notes in Computer Science(), vol 9330. Springer, Cham. https://doi.org/10.1007/978-3-319-24306-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-24306-1_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24305-4
Online ISBN: 978-3-319-24306-1
eBook Packages: Computer ScienceComputer Science (R0)