-
1
-
-
62849112329
-
Efficient cluster security gateway architecture for per-packet load balanced IP filtering on switched clusters
-
V. Ramsurrun, and K. M. S. Soyjaudah, "Efficient cluster security gateway architecture for per-packet load balanced IP filtering on switched clusters," in 2006 Proc. CSNDSP '06 Conf., pp. 256-261.
-
(2006)
2006 Proc. CSNDSP'06 Conf.
, pp. 256-261
-
-
Ramsurrun, V.1
Soyjaudah, K.M.S.2
-
3
-
-
0034449536
-
Implementing a distributed firewall
-
S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith, "Implementing a distributed firewall," in Proc. 7th ACM Conf. Computer and communications security, Athens, 2000, pp. 190-199. (Pubitemid 32393918)
-
(2000)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.D.2
Bellovin, S.M.3
Smith, J.M.4
-
4
-
-
0003226048
-
The keynote trust-management system version 2
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "The KeyNote Trust-Management System Version 2," RFC (Informational) 2704, Internet Engineering Task Force, 1999.
-
(1999)
RFC (Informational) 2704, Internet Engineering Task Force
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
5
-
-
0032643221
-
Firmato: A novel firewall management toolkit
-
Y. Bartal, A. Mayer, K. Nissim, and A. Wool, "Firmato: A Novel Firewall Management Toolkit," in Proc. IEEE Symposium Security and Privacy, 1999, pp. 17-31.
-
(1999)
Proc. IEEE Symposium Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
7
-
-
4544330891
-
-
W. Li (2000). Distributed Firewall [Online]. Available: http://citeseer.ist.psu.edu/liOOdistributed.htrnl
-
(2000)
Distributed Firewall
-
-
Li, W.1
-
9
-
-
62849123524
-
CCENT/CCNA ICND1 official exam certification guide
-
W. Odom, "CCENT/CCNA ICND1 Official Exam Certification Guide," 2nd ed. Indianapolis, USA: Cisco Press, 2008, pp. 253-256.
-
(2008)
2nd ed. Indianapolis, USA: Cisco Press
, pp. 253-256
-
-
Odom, W.1
-
10
-
-
0004229386
-
-
3rd ed., Addison- Wesley
-
W. R. Stevens, B. Fenner, and A. M. Rudoff, Unix Network Programming: The Sockets Networking API Volume 7,3rd ed., Addison- Wesley, 2004, pp. 595-598.
-
(2004)
Unix Network Programming: The Sockets Networking API Volume 7
, pp. 595-598
-
-
Stevens, W.R.1
Fenner, B.2
Rudoff, A.M.3
-
12
-
-
66549099254
-
-
Ebtables website
-
Ebtables website (2007). Who's behind Ebtables? [Online]. Available: http://ebtables.sourceforge,net/about,html#behind
-
(2007)
Who's Behind Ebtables?
-
-
-
13
-
-
66549109090
-
-
Bridge website
-
Bridge website (2007). Bridge [Online]. Available: http://linux- net.osdl.org/index.php/Bridge
-
(2007)
-
-
-
15
-
-
62849085773
-
-
L. Ortega (2007). GNU Mac Changer [Online]. Available: http://www.alobbs.com/macchanger/
-
(2007)
GNU Mac Changer
-
-
Ortega, L.1
-
16
-
-
66549086870
-
-
ClarkConnect website
-
ClarkConnect website (2007). Howtos-Clustering with LVS [Online]. Available: http://www.clarkconnect.com/wiki/index.php?title=Howtos-Clustering- with-LVS
-
(2007)
Howtos-Clustering with LVS
-
-
-
18
-
-
62849120109
-
-
Cisco Systems Inc.
-
Cisco Systems Inc. (2005). Configuring Network Security with ACLs [Online]. Available: http://www.cisco.com/en/US/products/hw/switches/ps628/ products conf iguration guide chapter09186a00800d84c8.html
-
(2005)
Configuring Network Security with ACLs
-
-
-
19
-
-
66549086618
-
-
R. Spenneberg (2007). IPsec HOWTO (Revision 0.9.96) [Online]. Available: http://www.ipsec-howto.org/
-
(2007)
-
-
Spenneberg, R.1
-
22
-
-
85132972574
-
Distributed denial of service: Taxonomies of attacks, tools, and countermeasures
-
S. M. Specht, and R. B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures," in 2004 Proc. 17th Int. Conf. Parallel and Distributed Computing Systems, pp. 543- 550.
-
(2004)
17th Int. Conf. Parallel and Distributed Computing Systems
, pp. 543-550
-
-
Specht, S.M.1
Lee, R.B.2
-
23
-
-
0003334329
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
P. Ferguson, and D. Senie, "Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing," RFC 2827,2000.
-
(2000)
RFC 2827
-
-
Ferguson, P.1
Senie, D.2
-
24
-
-
84942257511
-
The strongman architecture
-
A. D. Keromytis, S. Ioannidis, M. B. Greenwald, and J. M. Smith, "The STRONGMAN Architecture," in Proc. DARPA Information Survivability Conference and Exposition, vol.1,2003.
-
(2003)
Proc. DARPA Information Survivability Conference and Exposition
, vol.1
-
-
Keromytis, A.D.1
Ioannidis, S.2
Greenwald, M.B.3
Smith, J.M.4
-
25
-
-
66549099002
-
Managing access control in large-scale heterogeneous networks
-
A. D. Keromytis, K. G. Anagnostakis, S. Ioannidis, M. B. Greenwald, and J. M. Smith, "Managing Access Control in Large-Scale Heterogeneous Networks," in Proc. NATO C3 Symposium Interoperable Networks for Secure Communications (INSC'03), 2003.
-
(2003)
Proc. NATO C3 Symposium Interoperable Networks for Secure Communications (INSC'03)
-
-
Keromytis, A.D.1
Anagnostakis, K.G.2
Ioannidis, S.3
Greenwald, M.B.4
Smith, J.M.5
-
27
-
-
33845581445
-
Barbarians in the gate: An experimental validation of NIC-based distributed firewall performance and flood tolerance
-
M. Hide, and W. H. Sanders, "Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance," in 2006 Proc. Int. Conf. Dependable Systems and Networks (DSN 2006, pp. 209-216.
-
(2006)
2006 Proc. Int. Conf. Dependable Systems and Networks (DSN 2006)
, pp. 209-216
-
-
Hide, M.1
Sanders, W.H.2
|