Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy 1990
DOI: 10.1109/risp.1990.63859
|View full text |Cite
|
Sign up to set email alerts
|

A network security monitor

Abstract: DISCLAIMERWork I_rt"ormed undertheauspicesof the U.S. Departsent of Energy by LawrenceLivermore Nttiomtl Laboratory undercontractnumber W-740._ENG.48.This document was prepared as sn account of work sponsored by en agency of the United States Government. Neither the United States Government nor the University of Calit_omis nor any of their employees, makes any warranty, express or implied, or Jumumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0
1

Year Published

2003
2003
2021
2021

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 229 publications
(51 citation statements)
references
References 13 publications
0
44
0
1
Order By: Relevance
“…This observation makes sense for desktop machines and for servers (which primarily handle incoming connections), and makes less sense for machines running notification services. Evidence from [9,10] supports this observation, showing that most machines interact with a few other machines. The idea is to implement a filter on the network stack that uses a series of timeouts to restrict the rate of connections to new hosts such that most normal traffic is unaffected.…”
Section: Introductionmentioning
confidence: 78%
“…This observation makes sense for desktop machines and for servers (which primarily handle incoming connections), and makes less sense for machines running notification services. Evidence from [9,10] supports this observation, showing that most machines interact with a few other machines. The idea is to implement a filter on the network stack that uses a series of timeouts to restrict the rate of connections to new hosts such that most normal traffic is unaffected.…”
Section: Introductionmentioning
confidence: 78%
“…Unless they failed to publish further work, they built the framework and then tested only one IDS: NSM [15,16]. -Wan and Yang [17] developed a framework for testing sensors that used the Internet Engineering Task Force (IETF) Intrusion Detection Working Group (IDWG) Intrusion Detection Message Exchange Format (IDMEF) [18].…”
Section: Framework For Testingmentioning
confidence: 99%
“…The Network Based sub-class can be identified indirectly by intercepting strange communications or by monitoring the amount of traffic on the system [30]. These strange communications can be occur in Data, Network or Session layers.…”
Section: Attack Mechanism Determinationmentioning
confidence: 99%