Abstract
This paper proposes an improved protecting system against malicious traffic in intranet system. The proposed system in this thesis can reduce protect control and overloaded traffic volume by applying internal blocking method onto various channels and malicious traffic which were unable to block under the traditional structure. It has proved that the level of the intranet backbone CPU overflow can be reduced by this intranet protection method.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cook, A.: Building High Performance Firewall and Security Infra- structure, Nortel Networks (2002)
CCIMB. Common Methodology for Information Technology Security Evaluation, Part1~Part3. Version2.1 (1999)
CCIMB. Common Methodology for Information Technology Security Evaluation, Part2, Version1.0 (1999)
Edward Chow, C.: Introduction to Content Switch, University of Colorado (2000)
CIAO/VAF, Vulnerability Assessment Framework 1.1, Critical Infrastructure Assurance Office (CIAO), 10 (1999)
Baer, D.: Towards Compatibility with Firewall and Keyword search. Distributed Computing Group (2002)
Harley, D.: Virus Bible, Kyohaksa (2004)
Harley, D.: Virus Revealed, Kyohaksa (2002)
Mitchell, D., Carr, K.: Best Practice for multi-tier virus protection. Oxford University Press, Oxford (2002)
Department of Defense Computer Security Center. Department of Defense Trusted Computer System Evaluation Criteria (1983)
Peeples, D.: The Foundations of Risk Management. In: 20th National Information Security Conference (1990)
Shinder, T.W., Shinder, D.L.: ISA Server 2000. Syngress Media (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Noh, S., Song, E.J., Lee, D.C. (2006). Protection Structure Building for Malicious Traffic Protecting in Intranet Systems. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588_111
Download citation
DOI: https://doi.org/10.1007/11751588_111
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34072-0
Online ISBN: 978-3-540-34074-4
eBook Packages: Computer ScienceComputer Science (R0)