E-Collaboration Enhanced Host Security

E-Collaboration Enhanced Host Security

Zoltán Czirkos (Budapest University of Technology and Economics, Hungary), Gábor Hosszú (Budapest University of Technology and Economics, Hungary) and Ferenc Kovács (Budapest University of Technology and Economics, Hungary)
Copyright: © 2008 |Pages: 6
DOI: 10.4018/978-1-59904-000-4.ch027
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


The importance of the host security problems come into prominence by the growth of the Internet, since the network means a breaking point to the intruders (Wang, Jha, McDaniel, & Livny, 2004). The article presents the e-collaboration related security questions, the main concepts of the intrusion detection and the different classes of the system protection methods.

Key Terms in this Chapter

Collaborative Security System: A network-based system in which the participants share information about intrusion attempts and other events noticed. This way the security of each peers is increased, and the system is also able to discover network-size attacks.

Firewall: This is a host or router which provides a strict gateway to the Internet for a subnetwork, checking traffic and maybe dropping some network packets.

Security Policy: A set of rules to act, in which the expectations and provisions of accessibility of the computer for the users and the administrators are also included. It is worth it to be made up before initiating medium- or large-sized computer networking systems.

Client/Server Model: A communicating way, where one hardware or software entity (server) has more functionalities than the other entity (the client), whereas the client is responsible to initiate and close the communication session towards the server. Usually, the server provides services that the client can request from the server. Its alternative is the P2P model.

Application Level Network (ALN): The applications, which are running in the hosts, can create a virtual network from their logical connections. This is also called overlay network. The operations of such software entities are not able to understand without knowing their logical relations. Most cases of these ALN software entities use the P2P model, not the client/server model for the communication.

Data Integrity: The integrity of a computer system means that the host behaves and works as its administrator intended it to do so. Data integrity must therefore be always monitored.

Overlay Network: The applications, which create an ALN work together and usually follow the P2P communication model.

Peer-to-Peer (P2P) Model: A communication way where each node has the same authority and communication capability. Each peer provides services the others can use, and each peer sends requests to other ones.

Complete Chapter List

Search this Book: