[go: up one dir, main page]

Row et al., 1999 - Google Patents

Security issues in small linux networks

Row et al., 1999

View PDF
Document ID
6753889134752830389
Author
Row W
Morton D
Adams B
Wright A
Publication year
Publication venue
Proceedings of the 1999 ACM symposium on Applied computing

External Links

Snippet

ABSTRACT A case study of an intrusion into a Linux cluster for parallel computing is presented, along with an approach used by the authors to make the system less vulnerable to future intrusions. Linux clusters have revolutionized computing by providing access to …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
US11190489B2 (en) Methods and systems for establishing a connection between a first device and a second device across a software-defined perimeter
US6981143B2 (en) System and method for providing connection orientation based access authentication
US9258308B1 (en) Point to multi-point connections
AU687575B2 (en) Security system for interconnected computer networks
US10417428B2 (en) Methods and systems for providing and controlling cryptographic secure communications terminal providing a remote desktop accessible in secured and unsecured environments
US6182226B1 (en) System and method for controlling interactions between networks
US8332464B2 (en) System and method for remote network access
US10404747B1 (en) Detecting malicious activity by using endemic network hosts as decoys
Wool The use and usability of direction-based filtering in firewalls
US10382483B1 (en) User-customized deceptions and their deployment in networks
EP1563664A1 (en) Management of network security domains
US12010141B1 (en) System gateway while accessing protected non-web resources connected to internet
Row et al. Security issues in small linux networks
Cisco Understanding the Network Topology Tree
Cisco PIX Firewall Series Version 4.1(6) Release Notes
Calleja et al. CamGrid: Experiences in constructing a university-wide, Condor-based grid at the University of Cambridge
Frahim et al. Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance
Cameron et al. Configuring Juniper Networks NetScreen and SSG Firewalls
Marković et al. Analysis of packet switching in VoIP telephony at the command post of tactical level units
Norifusa Internet security: difficulties and solutions
Paavola Company grade network at home
Both Managing the Firewall
Upadhaya Free/open Source Software: Network Infrastructure and Security
Fabbri et al. Getting started with fortigate
Seifried Linux Administrators Security Guide