Row et al., 1999 - Google Patents
Security issues in small linux networksRow et al., 1999
View PDF- Document ID
- 6753889134752830389
- Author
- Row W
- Morton D
- Adams B
- Wright A
- Publication year
- Publication venue
- Proceedings of the 1999 ACM symposium on Applied computing
External Links
Snippet
ABSTRACT A case study of an intrusion into a Linux cluster for parallel computing is presented, along with an approach used by the authors to make the system less vulnerable to future intrusions. Linux clusters have revolutionized computing by providing access to …
- 238000000034 method 0 description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11190489B2 (en) | Methods and systems for establishing a connection between a first device and a second device across a software-defined perimeter | |
US6981143B2 (en) | System and method for providing connection orientation based access authentication | |
US9258308B1 (en) | Point to multi-point connections | |
AU687575B2 (en) | Security system for interconnected computer networks | |
US10417428B2 (en) | Methods and systems for providing and controlling cryptographic secure communications terminal providing a remote desktop accessible in secured and unsecured environments | |
US6182226B1 (en) | System and method for controlling interactions between networks | |
US8332464B2 (en) | System and method for remote network access | |
US10404747B1 (en) | Detecting malicious activity by using endemic network hosts as decoys | |
Wool | The use and usability of direction-based filtering in firewalls | |
US10382483B1 (en) | User-customized deceptions and their deployment in networks | |
EP1563664A1 (en) | Management of network security domains | |
US12010141B1 (en) | System gateway while accessing protected non-web resources connected to internet | |
Row et al. | Security issues in small linux networks | |
Cisco | Understanding the Network Topology Tree | |
Cisco | PIX Firewall Series Version 4.1(6) Release Notes | |
Calleja et al. | CamGrid: Experiences in constructing a university-wide, Condor-based grid at the University of Cambridge | |
Frahim et al. | Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance | |
Cameron et al. | Configuring Juniper Networks NetScreen and SSG Firewalls | |
Marković et al. | Analysis of packet switching in VoIP telephony at the command post of tactical level units | |
Norifusa | Internet security: difficulties and solutions | |
Paavola | Company grade network at home | |
Both | Managing the Firewall | |
Upadhaya | Free/open Source Software: Network Infrastructure and Security | |
Fabbri et al. | Getting started with fortigate | |
Seifried | Linux Administrators Security Guide |