This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Hidden Difficulties of Watching and Rebuilding Networks
March/April 2008 (vol. 6 no. 2)
pp. 79-82
Michael E. Locasto, Dartmouth College
Angelos Stavrou, George Mason University
Network protection can be difficult even for experienced IT staff and security researchers. In this installment of Secure Systems, the authors focus on two areas of network defense that are particularly troublesome to manage: network intrusion recovery and ubiquitous network monitoring.

1. M. Costa et al., "Bouncer: Securing Software By Blocking Bad Input," Proc. ACM Symp. Systems and Operating Systems Principles (SOSP 07), ACM Press, 2007, pp. 117–130.
2. V. Yegneswaran et al., "An Architecture for Generating Semantics-Aware Signatures," Proc. 14th Usenix Security Symp., Usenix Assoc., 2005, pp. 97–112.
3. S.M. Bellovin et al., "Risking Communications Security: Potential Hazards of the Protect America Act," IEEE Security &Privacy, vol. 6, no. 1, 2008, pp. 24–33.
4. W.R. Cheswick and S.M. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker, 1994; www.wilyhacker.comle/.
5. S.T. King and P.M. Chen, "Backtracking Intrusions," Proc. 19th ACM Symp. Operating Systems Principles (SOSP 03), ACM Press, 2003, pp. 223–236.
6. S. Neuhaus et al., "Predicting Vulnerable Software Components," Proc. 14th ACM Conf. Computer and Comm. Security (CCS 07), ACM Press, 2007, pp. 529–540.
7. P. Ohm, D. Sicker, and D. Grunwald, "Legal Issues Surrounding Monitoring During Network Research," Proc. Internet Measurement Conference (IMC 07), ACM Press, 2007; www.imconf.net/2.imc-2007/papersimcl52.pdf .
8. S. Landau, "A Gateway for Hackers," The Washington Post,9 Aug. 2007, p. A17.

Index Terms:
network defense, network intrusion recovery, network monitoring, Secure Systems
Citation:
Michael E. Locasto, Angelos Stavrou, "The Hidden Difficulties of Watching and Rebuilding Networks," IEEE Security & Privacy, vol. 6, no. 2, pp. 79-82, March-April 2008, doi:10.1109/MSP.2008.48
Usage of this product signifies your acceptance of the Terms of Use.