NIST logo

Publications Portal

You searched on:
Author: peter mell

Displaying records 21 to 30 of 34 records.
Resort by: Date / Title


21. An Overview of Issues in Testing Intrusion Detection Systems
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7007
Published: 7/11/2003
Authors: Peter M Mell, R Lippmann, Chung Tong Hu, J Haines, M Zissman
Abstract: While intrusion detection systems are becoming ubiquitous defenses in today's networks, currently we have no comprehensive and scientifically rigorous methodology to test the effectiveness of these systems. This paper explores the types of performa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50745

22. Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
Series: Special Publication (NIST SP)
Report Number: 800-51
Published: 9/1/2002
Authors: Peter M Mell, Timothy Grance
Abstract: [Superseded by SP 800-51 Rev. 1 (February 2011): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907934] The Common Vulnerabilities and Exposures (CVE) vulnerability naming scheme is a dictionary of common names for publicly known inform ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151265

23. Procedures for Handling Security Patches
Series: Special Publication (NIST SP)
Report Number: 800-40
Published: 8/1/2002
Authors: Peter M Mell, Miles C. Tracy
Abstract: [Superseded by SP 800-40 Version 2.0 (November 2005): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150402] Timely patching is critical to maintain the operational availability, confidentiality, and integrity of IT systems. However, fa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151264

24. Intrusion Detection Systems
Series: Special Publication (NIST SP)
Report Number: 800-31
Published: 11/1/2001
Authors: Rebecca Bace, Peter M Mell
Abstract: [Superseded by NIST SP 800-94, Guide to Intrusion Detection and Prevention Systems (IDPS), http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50951] Intrusion detection systems (IDSs) are software or hardware systems that automate the proce ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151244

25. A Denial-of-Service Resistant Intrusion Detection Architecture
Published: 10/1/2000
Authors: Peter M Mell, D G. Marks, Mark McLarnon
Abstract: As the capabilities of intrusion detection systems (IDS) advance, attackers may attempt to disable an organization's IDS before attempting to penetrate more valuable targets. As IDSs evolve into distributed systems withinterdependent components, they ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151228

26. Identifying Critical Patches With ICAT
Series: ITL Bulletin
Published: 7/1/2000
Author: Peter M Mell
Abstract: [For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov]The NIST computer security division has created a searchable index containing 700 of the most important computer vulnerabilities. This index, called ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151221

27. Mitigating Emerging Hacker Threats
Series: ITL Bulletin
Published: 6/28/2000
Authors: Peter M Mell, John P Wack
Abstract: [For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov] It seems that every week, computer security organizations are issuing press releases concerning the latest hacker attack. Some sound dangerous, lik ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151217

28. Acquiring and Deploying Intrusion Detection Systems
Series: ITL Bulletin
Published: 11/16/1999
Author: Peter M Mell
Abstract: This ITL Bulletin provides basic information about intrusion detection systems (IDSs) to help organizations avoid common pitfalls in acquiring, deploying, and maintaining IDSs.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151203

29. Understanding the World of Your Enemy With I-CAT (Internet-Categorization of Attacks Toolkit)
Published: 10/19/1999
Author: Peter M Mell
Abstract: Security professionals need to understand the attacks and vulnerabilities utilized by hackers to penetrate and shut down computer systems. However, security companies that collect such knowledge share very little of it with the general security commu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151185

30. Applying Mobile Agents to Intrusion Detection and Response
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6416
Published: 10/1/1999
Authors: Wayne Jansen, Athanasios T. (Tom) Karygiannis, D G. Marks, Peter M Mell
Abstract: Effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, mobile agents go a long way toward realizing the ideal behavior desired in an Intrusion Detection System (IDS). This report is an init ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151202



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series