Abstract
The effort to manage network security systems has increased in complexity over the past years. Network security for a company, university, or government agency can no longer be provided using a single Internet firewall or Intrusion Prevention System (IPS). Today, network administrators must deploy multiple intrusion detection and prevention nodes, traffic shapers, and firewalls in order to effectively protect their network. As the number of devices increases, maintaining a secure environment becomes difficult. This paper presents an infrastructure for control, configuration, and communication between heterogeneous network devices. The approach presented uses a Publish/Subscribe model built on top of a peer-to-peer overlay network in order to distribute information between network intrusion detection and prevention devices.
Chapter PDF
References
Global Velocity, http://www.globalvelocity.info/
Heirarchical token bucket, http://luxik.cdi.cz.devik/qpos/htb/
IETF Simple public key infrastructure (spki) charter (September 2003), http://www.batbox.org/wrt54g.html
Spade - statistical packet anomaly detection engine (2004), http://www.computersecurityonline.com/spade
Linksys (2005), http://www.linksys.com
Attig, M., Dharmapurikar, S., Lockwood, J.: Implementation results of bloom filters for string matchings. In: FCCM, Napa, CA (April 2004)
Lockwood, J.W.: Evolvable Internet hardware platforms. In: The Third NASA/DoD Workshop on Evolvable Hardware (EH 2001), pp. 271–279 (July 2001)
Madhusudan, B., Lockwood, J.: Design of a system for real-time worm detection. In: Hot Interconnects, Stanford, CA, pp. 77–83 (August 2004)
Paxson, V.: Bro: a system for detecting network intruders in real-time. In: Computer Networks, Amsterdam, Netherlands, vol. 31(23–24), pp. 2435–2463 (1999)
Roesch, M.: SNORT - lightweight intrusion detection for networks. In: LISA 1999: USENIX 13th Systems Administration Conference, Seattle, Washington (November 1999)
Traversat, B.: Project jxta 2.0 super-peer virtual network
White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S., Newbold, M., Hibler, M., Barb, C., Joglekar, A.: An integrated experimental environment for distributed systems and networks. In: Proc. of the Fifth Symposium on Operating Systems Design and Implementation, Boston, MA, pp. 255–270. USENIX Association (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Sproull, T., Lockwood, J. (2009). Extensible Network Configuration and Communication Framework. In: Hutchison, D., Denazis, S., Lefevre, L., Minden, G.J. (eds) Active and Programmable Networks. IWAN 2005. Lecture Notes in Computer Science, vol 4388. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00972-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-00972-3_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00971-6
Online ISBN: 978-3-642-00972-3
eBook Packages: Computer ScienceComputer Science (R0)