Computer security has not kept pace with the rapid growth of networked systems. Through its connection to the Internet, the Department of Defense is vulnerable to computer-based attacks. Current intrusion detection systems are still unproven, too complicated, or too costly for most system security officers to implement. The attack methods used by system intruders are known and can be represented as groups of commands called attack signatures. This thesis investigates methods for detecting intruders by monitoring command usage. Testing was conducted in both controlled and uncontrolled circumstances. With controlled testing, it was shown that 7 of the 11 signatures could be detected through command monitoring. Command recording deficiencies p...
An Intrusion detection system is generally considered to be any system designed to detect attempts ...
The United States Air Force relies heavily on computer networks for many day-to-day activities. Many...
Intrusion detection systems have usually been developed using large host-based components. These com...
Information security is very important in today’s society. Computer intrusion is one type of securit...
The United States Air Force extensively uses information systems as a tool managing and maintaining ...
Intrusion Detection System (IDS) is a vital network security tool for protecting the network systems...
Call number: LD2668 .T4 CMSC 1989 T83Master of ScienceComputing and Information Science
This thesis describes the development and evaluation of a novel system called the Network Attack Cha...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2006Includes bibliograp...
As advances in the networking technology help to connect distant corners of the globe and as the Int...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
This paper describes our technical approach to developing and delivering Unix host- and network-base...
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
An intrusion detection system (IDS) is a collection of monitors strategically placed on a network or...
Although UNIX is considered a very stable and secure platform, the development of Intrusion Detectio...
An Intrusion detection system is generally considered to be any system designed to detect attempts ...
The United States Air Force relies heavily on computer networks for many day-to-day activities. Many...
Intrusion detection systems have usually been developed using large host-based components. These com...
Information security is very important in today’s society. Computer intrusion is one type of securit...
The United States Air Force extensively uses information systems as a tool managing and maintaining ...
Intrusion Detection System (IDS) is a vital network security tool for protecting the network systems...
Call number: LD2668 .T4 CMSC 1989 T83Master of ScienceComputing and Information Science
This thesis describes the development and evaluation of a novel system called the Network Attack Cha...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2006Includes bibliograp...
As advances in the networking technology help to connect distant corners of the globe and as the Int...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
This paper describes our technical approach to developing and delivering Unix host- and network-base...
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
An intrusion detection system (IDS) is a collection of monitors strategically placed on a network or...
Although UNIX is considered a very stable and secure platform, the development of Intrusion Detectio...
An Intrusion detection system is generally considered to be any system designed to detect attempts ...
The United States Air Force relies heavily on computer networks for many day-to-day activities. Many...
Intrusion detection systems have usually been developed using large host-based components. These com...