You searched on: Author: peter mell
Displaying records 31 to 35.
Resort by: Date / Title
31. Applying Mobile Agents to Intrusion Detection and Response
NIST Interagency/Internal Report (NISTIR)
Wayne Jansen, Athanasios T Karygiannis, D G. Marks, Peter M Mell
Effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, mobile agents go a long way toward realizing the ideal behavior desired in an Intrusion Detection System (IDS). This report is an init ...
32. Securing Web Servers
Peter M Mell, David F Ferraiolo
This ITL Bulletin enumerates and describes techniques by which one can secure web servers. It categorizes the techniques into security levels to aid in their cost-effective application.
33. Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Peter M Mell, Mark McLarnon
Distributed intrusion detection systems are especially vulnerable to attacks since, typically, each component resides at a static location and components are connected together into a hierarchical structure. An attacker can disable such a system by ...
34. Computer Attacks: What They Are and How to Defend Against Them
Peter M Mell
Although a host of technologies exists to detect and prevent attacks against computers, a human must coordinate responding to a successful network penetration. At the same time, the majority of systems administrators are not prepared to handle a soph ...
35. Understanding the Global Attack Toolkit Using a Database of Dependent Classifiers
Peter M Mell
High profile Internet web sites publish a large collection of attack scripts that we call the Global Attack Toolkit (GAT). It is a dangerous tool available to the average web surfer and yet we known little about this set of attacks besides the fact t ...