References

Download as PDFDownload as PDF

[Lindner] Lindner, P, Beisel, T, Resch, M, Imamura, T, Menday, R, Wieder, P, Erwin, D, GRIDWELTEN: User Requirements and Environments for GRID-Computing:

http://www.hlrs.de/research/grids/gridwelten/gridwelten.pdf

[visited 15/03/2005]

Network Design

[Hillier] Hillier, J, The use of firewalls in the UK e-Science grid: http://e-science.ox.ac.uk/events/firewall-workshop/FirewallIdeas.pdf [visited 15/03/2005]

[PERT] Performance Enhancement and Reporting Team:

http://www.dante.net/pert/

[visited 15/03/2005]

[Skow] Skow, D, A Walk Through a Grid Security Incident:

http://www.triumf.ca/hepix2003/pres/23-10/dskow/1

[visited 15/03/2005]

Firewalls

[DynaFire] Green, M.L, Gallow, S.M, Miller, R, Grid-Enabled Virtual Organization Based Dynamic Firewall

http://www.ccr.buffalo.edu/grid/download/SC2004-Grid-Workshop-8-2004-9-pages.pdf

[visited 15/03/2005]

[PPPL] Introduction to authenticating at the PPPL firewall: http://access.pppl.gov/ [visited 21/03/2005]

Tunnelling

[Graupner & Reimann] Graupner, S & Reimann, C, Globus Grid and Firewalls: Issues and Solutions in a Utility Data Center Environment: http://www.hpl.hp.com/techreports/2002/HPL-2002-278.html [visited 15/03/2005]

System Management

[CERT-CC SI] Securing Networked Servers:

http://www.cert.org/security-improvement/modules/m10.html

[visited 15/03/2005]

Measurement and Monitoring

[GRIDMON] Grid Network Performance Monitoring for UK E-Science http://gridmon.dl.ac.uk [visited 15/03/2005]

Intrusion Detection Systems

[AIDE] Advanced Intrusion Detection Environment: http://sourceforge.net/projects/aide/ [visited 15/03/2005]

[BRO] Bro Intrusion Detection System: http://bro-ids.org/ [visited 15/03/2005]

[Chan] Chan, S, NERSC and Grid Security: http://grid.ncsa.uiuc.edu/gw04-security/GW04-SecWkshp-nersc.ppt [visited 15/03/2005]

[Hwang] Kai Hwang, Hua Liu, Ying Chen, Defending Distributed Systems Against Malicious Intrusions and Network Anomalies:

http://gridsec.usc.edu/files/TR/HwangSNS05Keynote.pdf

[visited 15/03/2005]

[NERSC] Using the BRO IDS in conjunction with GSI authentication:

http://www.globusworld.org/program/slides/9a_9.pdf

[visited 15/03/2005]

[Snort®] Snort®: open source intrusion detection system: http://www.snort.org/ [visited 15/03/2005]

[Tripwire] http://www.tripwire.org/ [visited 15/03/2005]

Incident Response

[CERT-CC HB] West-Brown, M.J, Stikvoort, D, Kossakowski K, Kilcrece, G, Ruefle, R, Zajicek, M, Handbook for Computer Security Incident Response Teams (CSIRTs): http://www.cert.org/archive/pdf/csirt-handbook.pdf [visited 15/03/2005]

[CERT-CC SoP] Kilcrece, G, Kossakowski K, Ruefle, R, Zajicek, State of the Practice of Computer Security Incident Response Teams (CSIRTs): http://www.cert.org/archive/pdf/03tr001.pdf [visited 15/03/2005]

[Demchenko] Demchenko, Y, Standards and Practices in Operational Security: http://edms.cern.ch/document/502041/1 [visited 10/05/2005]

[NIST] NIST Computer Security Incident Handling Guide (SP800-61): http://csrc.nist.gov/publications/nistpubs/index.html [visited 15/03/2005]

[OSG Incident] Open Science Grid, Grid Security Incident Handling and Response Guide, document 19 from

http://computing.final.gov/docdb/osg_documents/Static/Lists//FullList.html

[visited 15/03/2005]

[Post] Washington Post: ‘Hackers strike advanced computer networks’: http://www.washingtonpost.com/ac2/wp-dyn/A8995-2004Apr13 [visited 15/03/2005]