Real time active network compartmentalization

作者: Michael C. Dapp

DOI:

关键词:

摘要: Security policy manager devices are leveraged by objects to use highly secure user transparent communications provide detection of questionable activities at every node, automatic collection information related any potential attack, isolation the offending object with arbitrary flexibility response (e.g. flexibly determining level certainty an attack for initiation a in accordance number nodes be partitioned that is determined collected data concerning attack), changing trust relationships between security domains, limiting and launching offensive warfare capabilities outbound from compromised node while or eliminating inbound communications) log time simultaneously and/or concurrently different but possibly overlapping sections segments digital network configuration.

参考文章(125)
John G. Waclawsky, Stephen M. Matyas, Paul C. Hershey, Donald B. Johnson, An V. Le, John D. Wilkins, Network security system and method using a parallel finite state machine adaptive active monitor and responder ,(1993)
Michael Leon Pauser, Jyh-Herng Chow, Suet Mui Chiu, Hoang K. Chau, Isaac Kam-Chak Cheng, Jian Xu, Josephine Miu Cheng, Storing fragmented XML data into a relational database by decomposing XML documents with application specific mappings ,(2002)
T. Fraser, L. Badger, M. Feldman, Hardening COTS software with generic software wrappers darpa information survivability conference and exposition. ,vol. 2, pp. 323- 337 ,(2000) , 10.1109/DISCEX.2000.821530
Stephan Weber, Volker Thomas, Filter circuit arrangement ,(1997)
Stephen F. Froelich, Gabriel Beged-Dov, Hybrid parsing system and method ,(2001)