Return to Article Details Network Perimeter Security on Large Scale Networks