Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
DOI: 10.1109/csac.1999.816012
|View full text |Cite
|
Sign up to set email alerts
|

Architecture and concepts of the ARGuE Guard

Abstract: ARGuE (Advanced Research Guard for Experimentation) is a prototype guard being developed as a basis for experimentation.ARGuE is based on Network Associates' Gauntlet firewall. By integrating capabilities developed under several government programs, we were able to create a system which is easier to extend than other guards, provides significant new features (such as integration with an intrusion detection system), and yet has a reasonable degree of assurance.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…Typical boundary controllers include firewalls [TIS94,Che94], guards [Eps99], and Virtual Private Networks [Ros99]. By implementing a security perimeter around its important resources, an organization can achieve both a measure of control over the use of those resources and a means for monitoring access to them.…”
Section: Understanding Who Controls Resources In a Cloudmentioning
confidence: 99%
“…Typical boundary controllers include firewalls [TIS94,Che94], guards [Eps99], and Virtual Private Networks [Ros99]. By implementing a security perimeter around its important resources, an organization can achieve both a measure of control over the use of those resources and a means for monitoring access to them.…”
Section: Understanding Who Controls Resources In a Cloudmentioning
confidence: 99%
“…The author is not aware of similar systems in the application domain being discussed in the open literature; in the context of messaging and mail guards, such classification mechanisms have been described by Monteith et al [52], [53]. Simple keyword-based filtering and analysis on message traffic has e.g.…”
Section: Related Workmentioning
confidence: 99%
“…These correlation engines may also produce attack reports that would be visible by other Discovery Coordinator processes. At this time, four correlation engines have been integrated into the Discovery Coordinator: (1) a simple process that attempts to combine multiple reports of the same event into a single report; (2) Graph-based Intrusion Detection System (GrDDS [7]), which combines reports based on graph algorithms to locate coordinated distributed attacks; (3) a Perl-based component developed by Silicon Defense that filters out false positives by looking for corroboration of attack reports for events known to represent false alarms; and (4) the Stanford Complex Event Processor [16].…”
Section: Discovery Coordinator Applicationsmentioning
confidence: 99%