The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2008 vol.6)
pp: 79-82
Michael E. Locasto , Dartmouth College
Angelos Stavrou , George Mason University
Network protection can be difficult even for experienced IT staff and security researchers. In this installment of Secure Systems, the authors focus on two areas of network defense that are particularly troublesome to manage: network intrusion recovery and ubiquitous network monitoring.
network defense, network intrusion recovery, network monitoring, Secure Systems
Michael E. Locasto, Angelos Stavrou, "The Hidden Difficulties of Watching and Rebuilding Networks", IEEE Security & Privacy, vol.6, no. 2, pp. 79-82, March/April 2008, doi:10.1109/MSP.2008.48
1. M. Costa et al., "Bouncer: Securing Software By Blocking Bad Input," Proc. ACM Symp. Systems and Operating Systems Principles (SOSP 07), ACM Press, 2007, pp. 117–130.
2. V. Yegneswaran et al., "An Architecture for Generating Semantics-Aware Signatures," Proc. 14th Usenix Security Symp., Usenix Assoc., 2005, pp. 97–112.
3. S.M. Bellovin et al., "Risking Communications Security: Potential Hazards of the Protect America Act," IEEE Security &Privacy, vol. 6, no. 1, 2008, pp. 24–33.
4. W.R. Cheswick and S.M. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker, 1994; www.wilyhacker.comle/.
5. S.T. King and P.M. Chen, "Backtracking Intrusions," Proc. 19th ACM Symp. Operating Systems Principles (SOSP 03), ACM Press, 2003, pp. 223–236.
6. S. Neuhaus et al., "Predicting Vulnerable Software Components," Proc. 14th ACM Conf. Computer and Comm. Security (CCS 07), ACM Press, 2007, pp. 529–540.
7. P. Ohm, D. Sicker, and D. Grunwald, "Legal Issues Surrounding Monitoring During Network Research," Proc. Internet Measurement Conference (IMC 07), ACM Press, 2007; .
8. S. Landau, "A Gateway for Hackers," The Washington Post,9 Aug. 2007, p. A17.
3 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool