Abstract
This paper proposes a defense framework for large-scale computer network system(DFLCNS) to cope with potential threats. The DFLCNS is composed of prevention subsystem, intrusive detect subsystem, response subsystem, anti-attack subsystem. These subsystems co-work with each other to provide defense services.The new idea of the DFLCNS is active and cooperative comparing with others. Finally, the paper illustrates the prototype of the DFLCNS and conclude with future works.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
Similar content being viewed by others
Key words
References
http://seclab.cs.ucdavis.edu’responsel
L.Todd Heberlein,Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee,Jeff wood and David Wolber 1990 IEEE Computer Society Symposium on Research in Security and Privacy
http://www.cerias.purdue.edu/coast!intrusion-detection/detection.html
http://all.net/journal/journal/ntb/mathdeception/mathdeception.html
http://all.net/journal /journal/ntb/deception.html
Dorothy E Denning. An Intrusion Detection Model. In IEEE Transactions on Software Engineering, Number 2, page 222, February 1987
Edward Amoroso, ATampT Bell Laboratories. Fundamentals of Computer Security Technology. Prentice Hall International, Inc.
S.M. Bellovin Security problems in the TCP/IP protocol suite, Computer Communication Review,Vol 19,No. 2,pp 32–48, April 1989
Marco de Vivo,Gabriela O. De Vivo, Germinal Isern Internet Security Attacks at the Basic Levels, OPERATING SYSTEM REVIEW,1998
TCP SYN Flooding and IP Spoofing Attacks. CERT Advisory CA-96.21
Sandeep Kumar. Classification and Detection of Computer Intrusions. Ph.D. Dissertation, August 1995.
Herve.Debar, Marc Dacier, Andreas Wespi Towards a taxonomy of intrusion-detection systems, Computer Networks Vol 31 pp 805–822, 1999
W.Cheswick and Sibellovin. Firewall and Internet Security. Addsion —Wesley,1995
D.B.Chapman and E.D.Zwicky.Building Internet Firewalls. 0-Reilly amp Associates. Inc.. 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Jiang, J., Chen, W., Qing, S., Feng, D. (2000). The Defense Framework For Large-scale Computer Network System. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive