Protection Structure Building for Malicious Traffic Protecting in Intranet Systems

  • SiChoon Noh
  • Eun Jee Song
  • Dong Chun Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3981)


This paper proposes an improved protecting system against malicious traffic in intranet system. The proposed system in this thesis can reduce protect control and overloaded traffic volume by applying internal blocking method onto various channels and malicious traffic which were unable to block under the traditional structure. It has proved that the level of the intranet backbone CPU overflow can be reduced by this intranet protection method.


Server Group Protection Structure Malicious Code Security Domain Internal Path 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cook, A.: Building High Performance Firewall and Security Infra- structure, Nortel Networks (2002)Google Scholar
  2. 2.
    CCIMB. Common Methodology for Information Technology Security Evaluation, Part1~Part3. Version2.1 (1999)Google Scholar
  3. 3.
    CCIMB. Common Methodology for Information Technology Security Evaluation, Part2, Version1.0 (1999)Google Scholar
  4. 4.
    Edward Chow, C.: Introduction to Content Switch, University of Colorado (2000)Google Scholar
  5. 5.
    CIAO/VAF, Vulnerability Assessment Framework 1.1, Critical Infrastructure Assurance Office (CIAO), 10 (1999)Google Scholar
  6. 6.
    Baer, D.: Towards Compatibility with Firewall and Keyword search. Distributed Computing Group (2002)Google Scholar
  7. 7.
    Harley, D.: Virus Bible, Kyohaksa (2004)Google Scholar
  8. 8.
    Harley, D.: Virus Revealed, Kyohaksa (2002)Google Scholar
  9. 9.
    Mitchell, D., Carr, K.: Best Practice for multi-tier virus  protection. Oxford University Press, Oxford (2002)Google Scholar
  10. 10.
    Department of Defense Computer Security Center. Department of Defense Trusted Computer System Evaluation Criteria (1983)Google Scholar
  11. 11.
    Peeples, D.: The Foundations of Risk Management. In: 20th National Information Security Conference (1990)Google Scholar
  12. 12.
    Shinder, T.W., Shinder, D.L.: ISA Server 2000. Syngress Media (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • SiChoon Noh
    • 1
  • Eun Jee Song
    • 2
  • Dong Chun Lee
    • 3
  1. 1.Dept. of General EducationNamseoul Univ.Korea
  2. 2.Dept. of Computer ScienceNamseoul Univ.Korea
  3. 3.Dept. of Computer ScienceHowon Univ.Korea

Personalised recommendations