Download now Free registration required
Defenders of today's critical cyber-infrastructure (e.g., the Internet) are equipped with a wide array of security techniques including network-based Intrusion Detection Systems (IDS), host-based Anti-Virus systems (AV), and decoy or reconnaissance systems such as host-based honeypots or network-based telescopes. While effective at detecting and mitigating some of the threats posed to critical infrastructure, the ubiquitous nature of malicious activity (e.g., phishing, spam, DDoS) on the Internet indicates that the current deployments of these tools do not fully live up to their promise. Over the past 10 years the authors' research group has investigated ways of detecting and stopping cyber-attacks by using the context available in the network, host, and the environment.
- Format: PDF
- Size: 172.78 KB