Endpoint Firewall for Local Security Hardening in Academic Research Environment

This article presents a security system proposal, providing a low-level endpoint security and network activity monitoring. Its focus is to provide a necessary information for local administrators, who does not necessarily have the knowledge of networking infrastructure or access to it, according to the security policies of a parent organization. This paper presents a system designed for academic research environments, where it serves as a tool for an extended security in protection of sensitive data used in research and development against the local and remote threats.

[1]  Octavian Rusu,et al.  Analysis and prevention of network password guessing attacks in an enterprise environment , 2014, 2014 RoEduNet Conference 13th Edition: Networking in Education and Research Joint Event RENAM 8th Conference.

[2]  Grzegorz Czajkowski,et al.  Multitasking without compromise: a virtual machine evolution , 2001, SIGP.

[3]  Avishai Wool,et al.  Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese , 2010, IEEE Internet Computing.

[4]  Dawei Wang,et al.  Memory-Efficient Hypercube Flow Table for Packet Processing on Multi-Cores , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[5]  Jin Qian,et al.  The TCP Split Handshake: Practical Effects on Modern Network Equipment , 2010, Netw. Protoc. Algorithms.

[6]  Gabi Dreo Rodosek,et al.  Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 , 2013, CSS.

[7]  Michael Hamelin Preventing firewall meltdowns , 2010, Netw. Secur..

[8]  Xiangjian He,et al.  Improving cloud network security using the Tree-Rule firewall , 2014, Future Gener. Comput. Syst..

[9]  P. Winne,et al.  Feedback and Self-Regulated Learning: A Theoretical Synthesis , 1995 .

[10]  Sandeep K. Singhal,et al.  Designing an academic firewall: policy, practice, and experience with SURF , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[11]  Marcel Waldvogel,et al.  SIEGE: Service-independent enterprise-grade protection against password scans , 2014, DFN-Forum Kommunikationstechnologien.

[13]  Depei Qian,et al.  Multi-agent based intrusion detection architecture , 2001, Proceedings 2001 International Conference on Computer Networks and Mobile Computing.

[14]  Abhishek Agrawal,et al.  Artificial intelligent firewall , 2011, ACAI '11.

[15]  Richard Cimler,et al.  Cloud based solution for mobile healthcare application , 2014, IDEAS.

[16]  Zhi Chen,et al.  A New Lookup Model for Multiple Flow Tables of Open Flow with Implementation and Optimization Considerations , 2014, 2014 IEEE International Conference on Computer and Information Technology.

[17]  Sun-Hyung Kim,et al.  A Study on the Integrated Security System based Real-time Network Packet Deep Inspection , 2014 .

[18]  Ehab Al-Shaer,et al.  Dynamic rule-ordering optimization for high-speed firewall filtering , 2006, ASIACCS '06.