Protection Structure Building for Malicious Traffic Protecting in Intranet Systems
This paper proposes an improved protecting system against malicious traffic in intranet system. The proposed system in this thesis can reduce protect control and overloaded traffic volume by applying internal blocking method onto various channels and malicious traffic which were unable to block under the traditional structure. It has proved that the level of the intranet backbone CPU overflow can be reduced by this intranet protection method.
KeywordsServer Group Protection Structure Malicious Code Security Domain Internal Path
Unable to display preview. Download preview PDF.
- 1.Cook, A.: Building High Performance Firewall and Security Infra- structure, Nortel Networks (2002)Google Scholar
- 2.CCIMB. Common Methodology for Information Technology Security Evaluation, Part1~Part3. Version2.1 (1999)Google Scholar
- 3.CCIMB. Common Methodology for Information Technology Security Evaluation, Part2, Version1.0 (1999)Google Scholar
- 4.Edward Chow, C.: Introduction to Content Switch, University of Colorado (2000)Google Scholar
- 5.CIAO/VAF, Vulnerability Assessment Framework 1.1, Critical Infrastructure Assurance Office (CIAO), 10 (1999)Google Scholar
- 6.Baer, D.: Towards Compatibility with Firewall and Keyword search. Distributed Computing Group (2002)Google Scholar
- 7.Harley, D.: Virus Bible, Kyohaksa (2004)Google Scholar
- 8.Harley, D.: Virus Revealed, Kyohaksa (2002)Google Scholar
- 9.Mitchell, D., Carr, K.: Best Practice for multi-tier virus protection. Oxford University Press, Oxford (2002)Google Scholar
- 10.Department of Defense Computer Security Center. Department of Defense Trusted Computer System Evaluation Criteria (1983)Google Scholar
- 11.Peeples, D.: The Foundations of Risk Management. In: 20th National Information Security Conference (1990)Google Scholar
- 12.Shinder, T.W., Shinder, D.L.: ISA Server 2000. Syngress Media (2001)Google Scholar