Skip to main content

Protection Structure Building for Malicious Traffic Protecting in Intranet Systems

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3981))

Included in the following conference series:

  • 640 Accesses

Abstract

This paper proposes an improved protecting system against malicious traffic in intranet system. The proposed system in this thesis can reduce protect control and overloaded traffic volume by applying internal blocking method onto various channels and malicious traffic which were unable to block under the traditional structure. It has proved that the level of the intranet backbone CPU overflow can be reduced by this intranet protection method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cook, A.: Building High Performance Firewall and Security Infra- structure, Nortel Networks (2002)

    Google Scholar 

  2. CCIMB. Common Methodology for Information Technology Security Evaluation, Part1~Part3. Version2.1 (1999)

    Google Scholar 

  3. CCIMB. Common Methodology for Information Technology Security Evaluation, Part2, Version1.0 (1999)

    Google Scholar 

  4. Edward Chow, C.: Introduction to Content Switch, University of Colorado (2000)

    Google Scholar 

  5. CIAO/VAF, Vulnerability Assessment Framework 1.1, Critical Infrastructure Assurance Office (CIAO), 10 (1999)

    Google Scholar 

  6. Baer, D.: Towards Compatibility with Firewall and Keyword search. Distributed Computing Group (2002)

    Google Scholar 

  7. Harley, D.: Virus Bible, Kyohaksa (2004)

    Google Scholar 

  8. Harley, D.: Virus Revealed, Kyohaksa (2002)

    Google Scholar 

  9. Mitchell, D., Carr, K.: Best Practice for multi-tier virus  protection. Oxford University Press, Oxford (2002)

    Google Scholar 

  10. Department of Defense Computer Security Center. Department of Defense Trusted Computer System Evaluation Criteria (1983)

    Google Scholar 

  11. Peeples, D.: The Foundations of Risk Management. In: 20th National Information Security Conference (1990)

    Google Scholar 

  12. Shinder, T.W., Shinder, D.L.: ISA Server 2000. Syngress Media (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Noh, S., Song, E.J., Lee, D.C. (2006). Protection Structure Building for Malicious Traffic Protecting in Intranet Systems. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588_111

Download citation

  • DOI: https://doi.org/10.1007/11751588_111

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34072-0

  • Online ISBN: 978-3-540-34074-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics