Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publications Portal

You searched on: Author: peter mell

Displaying records 31 to 40 of 41 records.
Resort by: Date / Title

31. Intrusion Detection Systems
Series: Special Publication (NIST SP)
Report Number: 800-31
Published: 11/1/2001
Authors: Rebecca Bace, Peter M Mell
Abstract: [Superseded by NIST SP 800-94, Guide to Intrusion Detection and Prevention Systems (IDPS), http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50951] Intrusion detection systems (IDSs) are software or hardware systems that automate the proce ...

32. A Denial-of-Service Resistant Intrusion Detection Architecture
Published: 10/1/2000
Authors: Peter M Mell, D G. Marks, Mark McLarnon
Abstract: As the capabilities of intrusion detection systems (IDS) advance, attackers may attempt to disable an organization's IDS before attempting to penetrate more valuable targets. As IDSs evolve into distributed systems withinterdependent components, they ...

33. Identifying Critical Patches With ICAT
Series: ITL Bulletin
Published: 7/1/2000
Author: Peter M Mell
Abstract: [For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov]The NIST computer security division has created a searchable index containing 700 of the most important computer vulnerabilities. This index, called ...

34. Mitigating Emerging Hacker Threats
Series: ITL Bulletin
Published: 6/28/2000
Authors: Peter M Mell, John P Wack
Abstract: [For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov] It seems that every week, computer security organizations are issuing press releases concerning the latest hacker attack. Some sound dangerous, lik ...

35. Acquiring and Deploying Intrusion Detection Systems
Series: ITL Bulletin
Published: 11/16/1999
Author: Peter M Mell
Abstract: This ITL Bulletin provides basic information about intrusion detection systems (IDSs) to help organizations avoid common pitfalls in acquiring, deploying, and maintaining IDSs.

36. Understanding the World of Your Enemy With I-CAT (Internet-Categorization of Attacks Toolkit)
Published: 10/19/1999
Author: Peter M Mell
Abstract: Security professionals need to understand the attacks and vulnerabilities utilized by hackers to penetrate and shut down computer systems. However, security companies that collect such knowledge share very little of it with the general security commu ...

37. Applying Mobile Agents to Intrusion Detection and Response
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6416
Published: 10/1/1999
Authors: Wayne Jansen, Athanasios T Karygiannis, D G. Marks, Peter M Mell
Abstract: Effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, mobile agents go a long way toward realizing the ideal behavior desired in an Intrusion Detection System (IDS). This report is an init ...

38. Securing Web Servers
Series: ITL Bulletin
Published: 9/21/1999
Authors: Peter M Mell, David F Ferraiolo
Abstract: This ITL Bulletin enumerates and describes techniques by which one can secure web servers. It categorizes the techniques into security levels to aid in their cost-effective application.

39. Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Published: 9/8/1999
Authors: Peter M Mell, Mark McLarnon
Abstract: Distributed intrusion detection systems are especially vulnerable to attacks since, typically, each component resides at a static location and components are connected together into a hierarchical structure. An attacker can disable such a system by ...

40. Computer Attacks: What They Are and How to Defend Against Them
Series: ITL Bulletin
Published: 5/26/1999
Author: Peter M Mell
Abstract: Although a host of technologies exists to detect and prevent attacks against computers, a human must coordinate responding to a successful network penetration. At the same time, the majority of systems administrators are not prepared to handle a soph ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series