Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Peter Mell (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 51 - 65 of 65

An Overview of Issues in Testing Intrusion Detection Systems

July 11, 2003
Author(s)
Peter M. Mell, R Lippmann, Chung Tong Hu, J Haines, M Zissman
While intrusion detection systems are becoming ubiquitous defenses in today's networks, currently we have no comprehensive and scientifically rigorous methodology to test the effectiveness of these systems. This paper explores the types of performance

A Denial-of-Service Resistant Intrusion Detection Architecture

October 1, 2000
Author(s)
Peter M. Mell, D G. Marks, Mark McLarnon
As the capabilities of intrusion detection systems (IDS) advance, attackers may attempt to disable an organization's IDS before attempting to penetrate more valuable targets. As IDSs evolve into distributed systems withinterdependent components, they are

Identifying Critical Patches With ICAT

July 1, 2000
Author(s)
Peter M. Mell
[For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov]The NIST computer security division has created a searchable index containing 700 of the most important computer vulnerabilities. This index, called the

Mitigating Emerging Hacker Threats

June 28, 2000
Author(s)
Peter M. Mell, John P. Wack
[For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov] It seems that every week, computer security organizations are issuing press releases concerning the latest hacker attack. Some sound dangerous, like the

Acquiring and Deploying Intrusion Detection Systems

November 16, 1999
Author(s)
Peter M. Mell
This ITL Bulletin provides basic information about intrusion detection systems (IDSs) to help organizations avoid common pitfalls in acquiring, deploying, and maintaining IDSs.

Applying Mobile Agents to Intrusion Detection and Response

October 1, 1999
Author(s)
Wayne Jansen, Tom T. Karygiannis, D G. Marks, Peter M. Mell
Effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, mobile agents go a long way toward realizing the ideal behavior desired in an Intrusion Detection System (IDS). This report is an initial

Securing Web Servers

September 21, 1999
Author(s)
Peter M. Mell, David F. Ferraiolo
This ITL Bulletin enumerates and describes techniques by which one can secure web servers. It categorizes the techniques into security levels to aid in their cost-effective application.

Computer Attacks: What They Are and How to Defend Against Them

May 26, 1999
Author(s)
Peter M. Mell
Although a host of technologies exists to detect and prevent attacks against computers, a human must coordinate responding to a successful network penetration. At the same time, the majority of systems administrators are not prepared to handle a