Distributed deployment of Therminators in the network
dc.contributor.advisor | McEachen, John C. | |
dc.contributor.author | Cheng, Kah Wai | |
dc.date.accessioned | 2012-03-14T17:31:09Z | |
dc.date.available | 2012-03-14T17:31:09Z | |
dc.date.issued | 2004-12 | |
dc.identifier.uri | https://hdl.handle.net/10945/1281 | |
dc.description.abstract | The idea of deploying a distributed network intrusion system using Therminator is explored in this thesis. There are many advantages in having a distributed system compared to a standalone network intrusion system. The underlying principle of Therminator is modeling network traffic on conversation exchange models. Using Zippo, a new implementation of Therminator, the experimental setup consisted of multiple sensors reporting individual findings to a central server for aggregated analysis. Different scenarios of network attacks and intrusions were planned to investigate the effectiveness of the distributed system. The network attacks were taken from the M.I.T Lincoln Lab 1999 Data Sets. The distributed system was subjected to different combinations of network attacks in various parts of the network. The results were then analyzed to understand the behavior of the distributed system in response to the different attacks. In general, the distributed system detected all attacks under each scenario. Some surprising observations also indicated attack responses occurring in unanticipated scenarios. These results are subject to further investigation. | en_US |
dc.description.uri | http://archive.org/details/distributeddeplo109451281 | |
dc.format.extent | xvi, 89 p. : ill. (some col.) ; | en_US |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.rights | Copyright is reserved by the copyright owner. | en_US |
dc.subject.lcsh | Computer networks | en_US |
dc.subject.lcsh | Security measures | en_US |
dc.subject.lcsh | Computer security | en_US |
dc.subject.lcsh | Cyberterrorism | en_US |
dc.subject.lcsh | Prevention | en_US |
dc.title | Distributed deployment of Therminators in the network | en_US |
dc.type | Thesis | en_US |
dc.contributor.secondreader | Wen, Su | |
dc.contributor.corporate | Naval Postgraduate School (U.S.). | |
dc.contributor.department | Computer Science | |
dc.subject.author | Distributed | en_US |
dc.subject.author | Network Intrusion System | en_US |
dc.subject.author | Therminator | en_US |
dc.subject.author | Zippo | en_US |
dc.subject.author | Lincoln Lab Data | en_US |
dc.description.service | Defence Science & Technology Agency Singapore | en_US |
etd.thesisdegree.name | M.S. in Computer Science | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.