Design and Simulation of Policy Based Integrated Server System Capable to Provide Real - time Internet Security Service


The KIPS Transactions:PartC, Vol. 8, No. 5, pp. 565-572, Oct. 2001
10.3745/KIPSTC.2001.8.5.565,   PDF Download:

Abstract

Recently, due to the open architecture of the internet and wide spread of internet users, the cyber terror threatens to the network's weak point are tending grow. Until now, information security solutions are passive on security host and particular security system. This passive information security solution is weak from the attacks through the networks connected worldwide internet systems, and has limitation on the defense against cyber terror attacks. Therefore, network level integrated security function must be provided. In this paper, we consider technology limitations on the information security problems and its environment. Then we present the architecture and functions of policy-based information security services for network level active information security function. This paper also includes design of target system, which provide information security services. Finally, we discuss network level system deployment direction and discuss with Network Security Simulation.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
K. Y. Kim, G. I. Ahn, J. S. Jang, S. H. Lee, "Design and Simulation of Policy Based Integrated Server System Capable to Provide Real - time Internet Security Service," The KIPS Transactions:PartC, vol. 8, no. 5, pp. 565-572, 2001. DOI: 10.3745/KIPSTC.2001.8.5.565.

[ACM Style]
Ki Young Kim, Gae Il Ahn, Jong Soo Jang, and Sang Ho Lee. 2001. Design and Simulation of Policy Based Integrated Server System Capable to Provide Real - time Internet Security Service. The KIPS Transactions:PartC, 8, 5, (2001), 565-572. DOI: 10.3745/KIPSTC.2001.8.5.565.