This paper presents an intrusion experiment in which the target system was a Personal Computer network connected to a Novell NetWare 3.12 server. Undergraduate students with little security expertise and hardly any knowledge of the system served as attackers and were given the task of performing as many intrusions as possible. The objectives of the experiment were twofold: first, to learn more about how to gather and process data from intrusion experiments and to form a methodology applicable to a generic class of computer systems; and, second, to find out whether it is actually possible to create a secure system based on insecure PC workstations. This paper deals mainly with the latter objective, and investigates how and to what extent une...
Intrusion detection is a significant focus of research in the security of computer systems and netwo...
Over the last decade, the personal computer has been transformed from an isolated word processor and...
An intrusion is defined as any set of actions that attempts to compromise the integrity, the confi-d...
This paper presents an intrusion experiment in which the target system was a Novell NetWare 3.12 ser...
This paper describes a realistic intrusion experiment intended to investigate whether such experimen...
Abstract: In this paper, we study the security evolution of Novell NetWare from version 3.12 until t...
The first part of this thesis describes the results of applying dependability methods to the securit...
This paper describes a security model developed from empirical data collected from a realistic intru...
We describe a sequence of five experiments on network security that cast students successively in th...
This paper describes a security model developed fromempirical data collected from a realistic intrus...
Most computerized information systems we use in our everyday lives provide very little protection ag...
This paper presents research on computer security vulnerabilities in general-purpose network operati...
Trojan Horse is the most powerful malware that can produce an attack to penetrate into the network e...
PCS are used to control parts of the critical infrastructure of society, such as electric utilities,...
Our society is facing a growing threat from data breaches, where confidential information is stolen ...
Intrusion detection is a significant focus of research in the security of computer systems and netwo...
Over the last decade, the personal computer has been transformed from an isolated word processor and...
An intrusion is defined as any set of actions that attempts to compromise the integrity, the confi-d...
This paper presents an intrusion experiment in which the target system was a Novell NetWare 3.12 ser...
This paper describes a realistic intrusion experiment intended to investigate whether such experimen...
Abstract: In this paper, we study the security evolution of Novell NetWare from version 3.12 until t...
The first part of this thesis describes the results of applying dependability methods to the securit...
This paper describes a security model developed from empirical data collected from a realistic intru...
We describe a sequence of five experiments on network security that cast students successively in th...
This paper describes a security model developed fromempirical data collected from a realistic intrus...
Most computerized information systems we use in our everyday lives provide very little protection ag...
This paper presents research on computer security vulnerabilities in general-purpose network operati...
Trojan Horse is the most powerful malware that can produce an attack to penetrate into the network e...
PCS are used to control parts of the critical infrastructure of society, such as electric utilities,...
Our society is facing a growing threat from data breaches, where confidential information is stolen ...
Intrusion detection is a significant focus of research in the security of computer systems and netwo...
Over the last decade, the personal computer has been transformed from an isolated word processor and...
An intrusion is defined as any set of actions that attempts to compromise the integrity, the confi-d...