Skip to main content

Endpoint Firewall for Local Security Hardening in Academic Research Environment

  • Conference paper
  • First Online:
Computational Collective Intelligence

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9330))

Abstract

This article presents a security system proposal, providing a low-level endpoint security and network activity monitoring. Its focus is to provide a necessary information for local administrators, who does not necessarily have the knowledge of networking infrastructure or access to it, according to the security policies of a parent organization. This paper presents a system designed for academic research environments, where it serves as a tool for an extended security in protection of sensitive data used in research and development against the local and remote threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Greenwald, M., Singhal, S.K., Stone, J.R., Cheriton, D.R.: Designing an academic firewall: policy, practice, and experience with SURF. In: Network and Distributed System Security, pp. 79–92, February 22–23, 1996

    Google Scholar 

  2. Moon, C.-S., Kim, S.-H.: A study on the integrated security system based real-time network packet deep inspection. International Journal of Security and its Applications 8, 113–122 (2014)

    Article  Google Scholar 

  3. Hamelin, M.: Preventing firewall meltdowns. Network Security 2010(6), 15–16 (2010). doi:10.1016/S1353-4858(10)70083-0

    Article  Google Scholar 

  4. Hamed, H., Al-Shaer, E.: Dynamic rule-ordering optimization for high-speed firewall filtering. In: ASIACCS 2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 332–342 (2006). doi:10.1145/1128817.1128867

  5. Mishra, A., Agrawal, A., Ranjan R.: Artificial Intelligent Firewall. In: ACAI 2011 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, pp. 204–207 (2011). doi:10.1145/2007052.2007094

  6. Dubrawsky, I.: Firewall Evolution - Deep Packet Inspection. Infocus (July 2003)

    Google Scholar 

  7. Zhang, R., Qian, D., Ba, C., Wu, W., Guo, X.: Multi-agent based intrusion detection architecture. In: Computer Networks and Mobile Computing, pp. 494–501 (2001)

    Google Scholar 

  8. Dilley, J.A., Laghate, P., Summers, J., Devanneaux, T.: Cloud Based Firewall System And Service (2015). US Patent No.: 20150089582

    Google Scholar 

  9. Wool, A.: Trends in firewall configuration errors: Measuring the holes in swiss cheese. IEEE Internet Computing 14(4), 58–65 (2010)

    Article  Google Scholar 

  10. Beardsley, T., Qian, J.: The TCP Split Handshake: Practical Effects on Modern Network Equipment. Network Protocols and Algorithms 2 (2010)

    Google Scholar 

  11. Butler, D.L., Winne, P.H.: Feedback and Self-Regulated Learning: A Theoretical Synthesis. Review of Educational Research 65(3), 245–281 (1995). doi:10.3102/00346543065003245

    Article  Google Scholar 

  12. Vaarandi, R.: Simple Event Correlator for real-time security log monitoring. Hakin9 Magazine 1(6), 28–39 (2006)

    Google Scholar 

  13. Manolache, F.B., Hou, Q., Rusu, O.: Analysis and prevention of network password guessing attacks in an enterprise environment. In: RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference, pp. 1–7, September 11–13, 2014

    Google Scholar 

  14. Waldvogel, M., Kollek, J.: SIEGE: Service-Independent Enterprise-GradE protection against password scans (2014)

    Google Scholar 

  15. Czajkowski, G., Daynès, L.: Multitasking without compromise: a virtual machine evolution. In: Proceedings of the 16th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications, vol. 36(11), pp. 125–138 (2001). doi:10.1145/504282.504292

  16. He, A., Chomsiri, T., Nanda, P., Tan, Z.: Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems 30, 116–126 (2014)

    Article  Google Scholar 

  17. Cimler, R., Matyska, J., Sobeslav, V.: Cloud based solution for mobile healthcare application. In: Proceedings of the 18th International Database Engineering & Applications Symposium on - IDEAS 2014. doi:10.1145/2628194.2628217

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Josef Horalek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Balik, L., Horalek, J., Hornig, O., Sobeslav, V., Dolezal, R., Kuca, K. (2015). Endpoint Firewall for Local Security Hardening in Academic Research Environment. In: Núñez, M., Nguyen, N., Camacho, D., Trawiński, B. (eds) Computational Collective Intelligence. Lecture Notes in Computer Science(), vol 9330. Springer, Cham. https://doi.org/10.1007/978-3-319-24306-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24306-1_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24305-4

  • Online ISBN: 978-3-319-24306-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics