Security countermeasures have been geared toward building fortified systems that focus on prevention and detection of attacks, and recovery from damage. However, according to the Defense Advanced Research Projects Agency (DARPA), given the increasing mobility of computing devices, security approaches must radically change to be effective. Some ways of working ...Download Now
The authors describe an experimental Packet Header Anomaly Detector (PHAD) that learns the normal range of values for 33 fields of the Ethernet, IP, TCP, UDP, and ICMP protocols. On the 1999 DARPA off-line intrusion detection evaluation data set (Lippmann et al. 2000), PHAD detects 72 of 201 instances (29 ...Download Now
Cloud computing is gaining momentum in part because it enables a distributed systems infrastructure that offers more advantages than traditional ones. It provides a hosted environment of virtualized hardware, effectively unlimited storage, and software services that can aid in system development and deployment. This paper is the fourth in a ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?