System Intrusion

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 51225 Experts worldwide ranked by ideXlab platform

Ravi L Sahita - One of the best experts on this subject based on the ideXlab platform.

  • protocol decode based stateful firewall policy definition language
    IEEE International Workshop on Policies for Distributed Systems and Networks, 2004
    Co-Authors: P N Parmar, Priya Rajagopal, Ravi L Sahita
    Abstract:

    The policies for thwarting attacks on Systems vary greatly in complexity, ranging from simple static firewall rules to complex stateful protocol state machine analysis. As Intrusion detection Systems are getting integrated into firewall solutions, there is a need for a language that can define both firewall policies and System Intrusion behavior and exhibit inter-operable traits. This paper presents an XML based, self-documenting State-Aware Firewall Language (SAFire) that is designed to express the various kind of firewall and Intrusion behavior.

  • POLICY - Protocol decode based stateful firewall policy definition language
    Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks 2004. POLICY 2004., 2004
    Co-Authors: P N Parmar, Priya Rajagopal, Ravi L Sahita
    Abstract:

    The policies for thwarting attacks on Systems vary greatly in complexity, ranging from simple static firewall rules to complex stateful protocol state machine analysis. As Intrusion detection Systems are getting integrated into firewall solutions, there is a need for a language that can define both firewall policies and System Intrusion behavior and exhibit inter-operable traits. This paper presents an XML based, self-documenting State-Aware Firewall Language (SAFire) that is designed to express the various kind of firewall and Intrusion behavior.

Tharam S. Dillon - One of the best experts on this subject based on the ideXlab platform.

  • Refereed paper: System Intrusion processes: a simulation model
    Computers & Security, 1997
    Co-Authors: Tharam S. Dillon
    Abstract:

    In the past few years several break-in to computer networks and computer System have occured, and break-ins are becoming more widespread. They may be the acts of external intruders (outsiders), internal intruders (insiders) or both. More often than not, these intruders attack the System with malicious intent to affect System security attributes, namely secrecy, integrity and service availability. In our paper [1] (Computer & Security, 1995, 14, 621-631) we use a model to present an analytical study of computer System Intrusions. This subsequent paper describes a fixed-increment, time-advance, discrete-event simulation study of System Intrusion process. The analytical model is subsequently used to validate the simulation study.

  • Refereed paper: Setting optimal Intrusion-detection thresholds
    Computers & Security, 1995
    Co-Authors: B. C. Soh, Tharam S. Dillon
    Abstract:

    In this paper a model is developed to study an Intrusion detection process. From the model, a measure called the Secure Computation Index is proposed. This index is used to quantify the total aspect of an Intrusion-safe (or Intrusionresistant) System. Comparative studies based on the index can assist in making decisions on optimal strategic controls against any possible System Intrusion. In this paper, we show how the model can be used to help in setting optimal Intrusion-detection thresholds, which will provide the best Intrusion coverage with the minimum false positive rate.

P N Parmar - One of the best experts on this subject based on the ideXlab platform.

  • protocol decode based stateful firewall policy definition language
    IEEE International Workshop on Policies for Distributed Systems and Networks, 2004
    Co-Authors: P N Parmar, Priya Rajagopal, Ravi L Sahita
    Abstract:

    The policies for thwarting attacks on Systems vary greatly in complexity, ranging from simple static firewall rules to complex stateful protocol state machine analysis. As Intrusion detection Systems are getting integrated into firewall solutions, there is a need for a language that can define both firewall policies and System Intrusion behavior and exhibit inter-operable traits. This paper presents an XML based, self-documenting State-Aware Firewall Language (SAFire) that is designed to express the various kind of firewall and Intrusion behavior.

  • POLICY - Protocol decode based stateful firewall policy definition language
    Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks 2004. POLICY 2004., 2004
    Co-Authors: P N Parmar, Priya Rajagopal, Ravi L Sahita
    Abstract:

    The policies for thwarting attacks on Systems vary greatly in complexity, ranging from simple static firewall rules to complex stateful protocol state machine analysis. As Intrusion detection Systems are getting integrated into firewall solutions, there is a need for a language that can define both firewall policies and System Intrusion behavior and exhibit inter-operable traits. This paper presents an XML based, self-documenting State-Aware Firewall Language (SAFire) that is designed to express the various kind of firewall and Intrusion behavior.

Victoria Stavridou - One of the best experts on this subject based on the ideXlab platform.

  • IEEE Symposium on Security and Privacy - Intrusion-tolerant Enclaves
    Proceedings 2002 IEEE Symposium on Security and Privacy, 1
    Co-Authors: Bruno Dutertre, V. Crettaz, Victoria Stavridou
    Abstract:

    Despite our best efforts, any sufficiently complex computer System has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be able to penetrate the System. Intrusion tolerance attempts to maintain acceptable service despite such Intrusions. This paper presents an application of Intrusion-tolerance concepts to Enclaves, a software infrastructure for supporting secure group applications. Intrusion tolerance is achieved via a combination of Byzantine fault-tolerant protocols and secret sharing techniques.

Priya Rajagopal - One of the best experts on this subject based on the ideXlab platform.

  • protocol decode based stateful firewall policy definition language
    IEEE International Workshop on Policies for Distributed Systems and Networks, 2004
    Co-Authors: P N Parmar, Priya Rajagopal, Ravi L Sahita
    Abstract:

    The policies for thwarting attacks on Systems vary greatly in complexity, ranging from simple static firewall rules to complex stateful protocol state machine analysis. As Intrusion detection Systems are getting integrated into firewall solutions, there is a need for a language that can define both firewall policies and System Intrusion behavior and exhibit inter-operable traits. This paper presents an XML based, self-documenting State-Aware Firewall Language (SAFire) that is designed to express the various kind of firewall and Intrusion behavior.

  • POLICY - Protocol decode based stateful firewall policy definition language
    Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks 2004. POLICY 2004., 2004
    Co-Authors: P N Parmar, Priya Rajagopal, Ravi L Sahita
    Abstract:

    The policies for thwarting attacks on Systems vary greatly in complexity, ranging from simple static firewall rules to complex stateful protocol state machine analysis. As Intrusion detection Systems are getting integrated into firewall solutions, there is a need for a language that can define both firewall policies and System Intrusion behavior and exhibit inter-operable traits. This paper presents an XML based, self-documenting State-Aware Firewall Language (SAFire) that is designed to express the various kind of firewall and Intrusion behavior.