NIST logo

Publications Portal

You searched on: Author: peter mell

Displaying records 31 to 37.
Resort by: Date / Title

31. Acquiring and Deploying Intrusion Detection Systems
Series: ITL Bulletin
Published: 11/16/1999
Author: Peter M Mell
Abstract: This ITL Bulletin provides basic information about intrusion detection systems (IDSs) to help organizations avoid common pitfalls in acquiring, deploying, and maintaining IDSs.

32. Understanding the World of Your Enemy With I-CAT (Internet-Categorization of Attacks Toolkit)
Published: 10/19/1999
Author: Peter M Mell
Abstract: Security professionals need to understand the attacks and vulnerabilities utilized by hackers to penetrate and shut down computer systems. However, security companies that collect such knowledge share very little of it with the general security commu ...

33. Applying Mobile Agents to Intrusion Detection and Response
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6416
Published: 10/1/1999
Authors: Wayne Jansen, Athanasios T Karygiannis, D G. Marks, Peter M Mell
Abstract: Effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, mobile agents go a long way toward realizing the ideal behavior desired in an Intrusion Detection System (IDS). This report is an init ...

34. Securing Web Servers
Series: ITL Bulletin
Published: 9/21/1999
Authors: Peter M Mell, David F Ferraiolo
Abstract: This ITL Bulletin enumerates and describes techniques by which one can secure web servers. It categorizes the techniques into security levels to aid in their cost-effective application.

35. Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Published: 9/8/1999
Authors: Peter M Mell, Mark McLarnon
Abstract: Distributed intrusion detection systems are especially vulnerable to attacks since, typically, each component resides at a static location and components are connected together into a hierarchical structure. An attacker can disable such a system by ...

36. Computer Attacks: What They Are and How to Defend Against Them
Series: ITL Bulletin
Published: 5/26/1999
Author: Peter M Mell
Abstract: Although a host of technologies exists to detect and prevent attacks against computers, a human must coordinate responding to a successful network penetration. At the same time, the majority of systems administrators are not prepared to handle a soph ...

37. Understanding the Global Attack Toolkit Using a Database of Dependent Classifiers
Published: 11/5/1998
Author: Peter M Mell
Abstract: High profile Internet web sites publish a large collection of attack scripts that we call the Global Attack Toolkit (GAT). It is a dangerous tool available to the average web surfer and yet we known little about this set of attacks besides the fact t ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series