Rhodes Software

Displaying 1-3 of 3 results

  • White Papers // Aug 2012

    An Exploratory Framework for Extrusion Detection

    Modern network architecture allows multiple connectivity options, increasing the number of possible attack vectors. With the number of internet enabled devices constantly increasing, along with employees using these devices to access internal corporate networks, the attack surface has become too large to monitor from a single end-point. Traditional security measures...

    Provided By Rhodes Software

  • White Papers // Jan 2012

    Functional Programming and Security

    This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional codes are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better...

    Provided By Rhodes Software

  • White Papers // May 2011

    A Framework for DNS Based Detection and Mitigation of Malware Infections on a Network

    Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. DNS is one of the most prevalent protocols on modern networks and is essential for the correct operation...

    Provided By Rhodes Software

  • White Papers // Jan 2012

    Functional Programming and Security

    This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional codes are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better...

    Provided By Rhodes Software

  • White Papers // Aug 2012

    An Exploratory Framework for Extrusion Detection

    Modern network architecture allows multiple connectivity options, increasing the number of possible attack vectors. With the number of internet enabled devices constantly increasing, along with employees using these devices to access internal corporate networks, the attack surface has become too large to monitor from a single end-point. Traditional security measures...

    Provided By Rhodes Software

  • White Papers // May 2011

    A Framework for DNS Based Detection and Mitigation of Malware Infections on a Network

    Modern botnet trends have lead to the use of IP and domain fast-fluxing to avoid detection and increase resilience. These techniques bypass traditional detection systems such as blacklists and intrusion detection systems. DNS is one of the most prevalent protocols on modern networks and is essential for the correct operation...

    Provided By Rhodes Software