NIST logo

Publications Portal

You searched on: Author: peter mell

Displaying records 31 to 40.
Resort by: Date / Title


31. A Denial-of-Service Resistant Intrusion Detection Architecture
Published: 10/1/2000
Authors: Peter M Mell, D G. Marks, Mark McLarnon
Abstract: As the capabilities of intrusion detection systems (IDS) advance, attackers may attempt to disable an organization's IDS before attempting to penetrate more valuable targets. As IDSs evolve into distributed systems withinterdependent components, they ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151228

32. Identifying Critical Patches With ICAT
Series: ITL Bulletin
Published: 7/1/2000
Author: Peter M Mell
Abstract: [For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov]The NIST computer security division has created a searchable index containing 700 of the most important computer vulnerabilities. This index, called ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151221

33. Mitigating Emerging Hacker Threats
Series: ITL Bulletin
Published: 6/28/2000
Authors: Peter M Mell, John P Wack
Abstract: [For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov] It seems that every week, computer security organizations are issuing press releases concerning the latest hacker attack. Some sound dangerous, lik ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151217

34. Acquiring and Deploying Intrusion Detection Systems
Series: ITL Bulletin
Published: 11/16/1999
Author: Peter M Mell
Abstract: This ITL Bulletin provides basic information about intrusion detection systems (IDSs) to help organizations avoid common pitfalls in acquiring, deploying, and maintaining IDSs.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151203

35. Understanding the World of Your Enemy With I-CAT (Internet-Categorization of Attacks Toolkit)
Published: 10/19/1999
Author: Peter M Mell
Abstract: Security professionals need to understand the attacks and vulnerabilities utilized by hackers to penetrate and shut down computer systems. However, security companies that collect such knowledge share very little of it with the general security commu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151185

36. Applying Mobile Agents to Intrusion Detection and Response
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6416
Published: 10/1/1999
Authors: Wayne Jansen, Athanasios T Karygiannis, D G. Marks, Peter M Mell
Abstract: Effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, mobile agents go a long way toward realizing the ideal behavior desired in an Intrusion Detection System (IDS). This report is an init ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151202

37. Securing Web Servers
Series: ITL Bulletin
Published: 9/21/1999
Authors: Peter M Mell, David F Ferraiolo
Abstract: This ITL Bulletin enumerates and describes techniques by which one can secure web servers. It categorizes the techniques into security levels to aid in their cost-effective application.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151196

38. Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Published: 9/8/1999
Authors: Peter M Mell, Mark McLarnon
Abstract: Distributed intrusion detection systems are especially vulnerable to attacks since, typically, each component resides at a static location and components are connected together into a hierarchical structure. An attacker can disable such a system by ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151206

39. Computer Attacks: What They Are and How to Defend Against Them
Series: ITL Bulletin
Published: 5/26/1999
Author: Peter M Mell
Abstract: Although a host of technologies exists to detect and prevent attacks against computers, a human must coordinate responding to a successful network penetration. At the same time, the majority of systems administrators are not prepared to handle a soph ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151188

40. Understanding the Global Attack Toolkit Using a Database of Dependent Classifiers
Published: 11/5/1998
Author: Peter M Mell
Abstract: High profile Internet web sites publish a large collection of attack scripts that we call the Global Attack Toolkit (GAT). It is a dangerous tool available to the average web surfer and yet we known little about this set of attacks besides the fact t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151651



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series