Personal Firewalls and Intrusion Detection Systems
نویسندگان
چکیده
In this paper we explore how secure coprocessors can be used to secure client devices, especially mobile clients such as notebook computers. The goal is to protect data on the mobile client in case of theft, and to adapt the client's protection to the working environment --such as the Intranet or Internet-without relying completely on the integrity of the client. We show how physically secure coprocessors can introduce a security lifecycle into commercial off the shelf (COTS) clients by booting the client into a secure starting state, supervising the client's configuration and operation, and inspecting any network traffic that is sent or received by the client.
منابع مشابه
Firewalls Intrusion Detection Systems And Antivirus Software
This includes checking server and firewall logs, scrutinizing network traffic, firewalls, intrusion detection systems, cryptography systems and antivirus software. tutorials, software listings and reviews for information security professionals covering topics such as firewalls, viruses, intrusion detection and other security topics. WindowSecurity.com Readers' Choice Award Winner Email Anti Vir...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملSecurity aspects in IPv6 networks - implementation and testing
IPv6 protocol, which should replace the actual IPv4 protocol, brings many new possibilities and improvements considering simplicity, routing speed, quality of service and security. In comparison to IPv4, IPv6 improves mechanisms for assuring a secure and confidential transfer of information. Despite these improvements, network security remains a very important issue since there are some securit...
متن کاملIntrusion Detection System Data Mining
because firewalls and Intrusion Detection Systems usually only defend against value to the whole system Data mining techniques can be applied to gain. detection system (IDS) based on data mining techniques.
متن کاملUse Of Genetic Algorithms In Intrusion Detection Systems
Genetic Algorithm technique try to improve the rates for better detection. The proposed firewalls, antivirus, and intrusion detection systems. (IDSs), cybercriminal activity automatically use these groups to train a new RBF classifier to detect. Abstract— Intrusion Detection Systems (IDSs) detects the network attacks by For this purpose Genetic Algorithm uses a function called. “Fitness Function”.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001