Inicio Nosotros Búsquedas
Buscar en nuestra Base de Datos:     
Autor: =Champion, Terrence
Sólo un registro cumplió la condición especificada en la base de información BIBCYT.
Publicación seriada
Referencias AnalíticasReferencias Analíticas
Autor: Durst, Robert sdurst@sappho.rl.af.mil
Oprima aquí para enviar un correo electrónico a esta dirección ; Champion, Terrence tgc@sappho.rl.af.mil
Oprima aquí para enviar un correo electrónico a esta dirección; Witten, Brian witten@sappho.rl.af.mil
Oprima aquí para enviar un correo electrónico a esta dirección; Miller, Eric ejm6@leland.stanford.edu
Oprima aquí para enviar un correo electrónico a esta dirección; Spagnuolo, Luigi spagl@sappho.rl.af.mil
Oprima aquí para enviar un correo electrónico a esta dirección
Título: Testing and Evaluating Computer Intrusion Detection Systems
Páginas/Colación: pp.53-61; 28cm; il.
Communications of the ACM Vol. 42, no. 7 July 1999
Información de existenciaInformación de existencia

Resumen
This article discusses the vulnerability of computer networks in the U.S. and suggests some solutions to keep systems safe from hacking. Computer hackers constantly invent new attacks and disseminate them over the Web. These problems are not limited to the government-many corporations fight industrial espionage daily to protect trade secret information. Juvenile hackers, while not necessarily as malicious as dedicated adversaries, can still wreak significant damage to systems and their defenses. Moreover, disgruntled employees, bribery and coercion make networks vulnerable to attacks from the inside. Computer programs like ActiveX, Java, and increasing reliance on "commercial off-the-shelf" technology help infiltrators make unknowing accomplices of legitimate users. Network-based ID systems monitor network traffic between hosts. Unlike host-based ID systems, which detect malicious behavior outright, these systems deduce behavior based on the content and format of data packets on the network. Among other things, they analyze overt requests for sensitive information and repeated failed attempts to violate security policy. Many current network-based ID systems are quite primitive, only watching for the words and commands of a hacker's vocabulary. INSET: More information on specific research projects is available at:.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

UCLA - Biblioteca de Ciencias y Tecnologia Felix Morales Bueno

Generados por el servidor 'bibcyt.ucla.edu.ve' (18.222.155.58)
Adaptive Server Anywhere (07.00.0000)
ODBC
Sesión="" Sesión anterior=""
ejecutando Back-end Alejandría BE 7.0.7b0 ** * *
18.222.155.58 (NTM) bajo el ambiente Apache/2.2.4 (Win32) PHP/5.2.2.
usando una conexión ODBC (RowCount) al manejador de bases de datos..
Versión de la base de información BIBCYT: 7.0.0 (con listas invertidas [2.0])

Cliente: 18.222.155.58
Salida con Javascript


** Back-end Alejandría BE 7.0.7b0 *