NIST logo

Publications Portal

You searched on:
Author: peter mell

Displaying records 21 to 30 of 31 records.
Resort by: Date / Title


21. Intrusion Detection Systems
Series: Special Publication (NIST SP)
Report Number: 800-31
Published: 11/1/2001
Authors: Rebecca Bace, Peter M Mell
Abstract: [Superseded by NIST SP 800-94, Guide to Intrusion Detection and Prevention Systems (IDPS), http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50951] Intrusion detection systems (IDSs) are software or hardware systems that automate the proce ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151244

22. A Denial-of-Service Resistant Intrusion Detection Architecture
Published: 10/1/2000
Authors: Peter M Mell, D G. Marks, M McLarnon
Abstract: As the capabilities of intrusion detection systems (IDS) advance, attackers may attempt to disable an organization's IDS before attempting to penetrate more valuable targets. As IDSs evolve into distributed systems withinterdependent components, they ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151228

23. Identifying Critical Patches With ICAT
Series: ITL Bulletin
Published: 7/1/2000
Author: Peter M Mell
Abstract: [For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov]The NIST computer security division has created a searchable index containing 700 of the most important computer vulnerabilities. This index, called ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151221

24. Mitigating Emerging Hacker Threats
Series: ITL Bulletin
Published: 6/28/2000
Authors: Peter M Mell, John P Wack
Abstract: [For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov] It seems that every week, computer security organizations are issuing press releases concerning the latest hacker attack. Some sound dangerous, lik ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151217

25. Acquiring and Deploying Intrusion Detection Systems
Series: ITL Bulletin
Published: 11/16/1999
Author: Peter M Mell
Abstract: This ITL Bulletin provides basic information about intrusion detection systems (IDSs) to help organizations avoid common pitfalls in acquiring, deploying, and maintaining IDSs.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151203

26. Understanding the World of Your Enemy With I-CAT (Internet-Categorization of Attacks Toolkit)
Published: 10/19/1999
Author: Peter M Mell
Abstract: Security professionals need to understand the attacks and vulnerabilities utilized by hackers to penetrate and shut down computer systems. However, security companies that collect such knowledge share very little of it with the general security commu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151185

27. Applying Mobile Agents to Intrusion Detection and Response
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6416
Published: 10/1/1999
Authors: Wayne Jansen, Athanasios T Karygiannis, D G. Marks, Peter M Mell
Abstract: Effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, mobile agents go a long way toward realizing the ideal behavior desired in an Intrusion Detection System (IDS). This report is an init ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151202

28. Securing Web Servers
Series: ITL Bulletin
Published: 9/21/1999
Authors: Peter M Mell, David F Ferraiolo
Abstract: This ITL Bulletin enumerates and describes techniques by which one can secure web servers. It categorizes the techniques into security levels to aid in their cost-effective application.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151196

29. Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Published: 9/8/1999
Authors: Peter M Mell, M McLarnon
Abstract: Distributed intrusion detection systems are especially vulnerable to attacks since, typically, each component resides at a static location and components are connected together into a hierarchical structure. An attacker can disable such a system by ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151206

30. Computer Attacks: What They Are and How to Defend Against Them
Series: ITL Bulletin
Published: 5/26/1999
Author: Peter M Mell
Abstract: Although a host of technologies exists to detect and prevent attacks against computers, a human must coordinate responding to a successful network penetration. At the same time, the majority of systems administrators are not prepared to handle a soph ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151188



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series