ผู้เขียน
Sotiris Ioannidis, Angelos D Keromytis, Steve M Bellovin, Jonathan M Smith
วันที่เผยแพร่
2000/11/1
หนังสือ
Proceedings of the 7th ACM conference on Computer and communications security
หน้า
190-199
คำอธิบาย
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does not see, so, effectively, everyone on the protected side is trusted. While this model has worked well for small to medium size networks, networking trends such as increased connectivity, higher line speeds, extranets, and telecommuting threaten to make it obsolete.
To address the shortcomings of traditional firewalls, the concept of a" distributed firewall" has been proposed. In this scheme, security policy is still centrally defined, but enforcement is left up to the individual endpoints. IPsec may be used to distribute credentials that express parts of the overall network policy. Alternately, these credentials may be obtained through out-of-band means. In this paper, we present the design and implementation of a distributed firewall using the KeyNote trust …
การอ้างอิงทั้งหมด
1999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202433162743333342513132262529446176765772545038382116
บทความทางวิชาการ