NPS logo Naval Postgraduate School
Dudley Knox Library
        View Item 
        •   Calhoun Home
        • Theses and Dissertations
        • 1. Thesis and Dissertation Collection, all items
        • View Item
        •   Calhoun Home
        • Theses and Dissertations
        • 1. Thesis and Dissertation Collection, all items
        • View Item
        • How to search in Calhoun
        • My Accounts
        • Ask a Librarian
        JavaScript is disabled for your browser. Some features of this site may not work without it.

        Browse

        All of CalhounCollectionsThis Collection

        My Account

        LoginRegister

        Statistics

        Most Popular ItemsStatistics by CountryMost Popular Authors

        Modeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth posture

        Thumbnail
        View/Open
        Icon04Sep_Givens.pdf (3.281Mb)
        Download Record
        Download to EndNote/RefMan (RIS)
        Download to BibTex
        Author
        Givens, Mark Allen
        Date
        2004-09
        Advisor
        Bordetsky, Alex
        Roth, Joe
        Metadata
        Show full item record
        Abstract
        In order to ensure the confidentially, integrity, and availability of networked resources operating on the Global Information Grid, the Department of Defense has incorporated a "Defense-in-Depth" posture. This posture includes the use of network security mechanisms and does not rely on a single defense for protection. Firewalls, Intrusion Detection Systems (IDS's), Anti-Virus (AV) software, and routers are such tools used. In recent years, computer security discussion groups have included IDS's as one of their most relevant issues. These systems help identify intruders that exploit vulnerabilities associated with operating systems, application software, and computing hardware. When IDS's are utilized on a host computer or network, there are two primary approaches to detecting and / or preventing attacks. Traditional IDS's, like most AV software, rely on known "signatures" to detect attacks. This thesis will focus on the secondary approach: Anomaly or "behavioral based" IDS's look for abnormal patterns of activity on a network to identify suspicious behavior.
        Description
        Approved for public release; distribution is unlimited
        URI
        http://hdl.handle.net/10945/1421
        Collections
        • 1. Thesis and Dissertation Collection, all items

        Related items

        Showing items related by title, author, creator and subject.

        • Thumbnail

          Homeland Security Affairs Journal, Volume II - 2006: Issue 2, July 

          Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);
          July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
        • Thumbnail

          The optimal employment and defense of a deep seaweb acoustic network for submarine communications at speed and depth using a defender-attacker-defender model 

          Hendricksen, Andrew D. (Monterey, California: Naval Postgraduate School, 2013-09);
          The need for submarines to execute communications at speed and depth (CSD) is a vital link in our nations and our allies defense network. A promising method to do this without limiting the inherent stealth and advantage ...
        • Thumbnail

          The activation and testing of the network CODASYL-DML interface of the M_x001B_p2_x001B_sDBMS using the EWIR database 

          Werre, Timothy J.; Diehl, Barry A. (Monterey, California. Naval Postgraduate School, 1996-06);
          The Electronic Warfare Integrated Reprogramming Database (EWIRDB) is the primary Department of Defense source for technical parametric performance data on non-communications emitters. A problem of the EWIRDB is that the ...
        Feedback

        411 Dyer Rd. Bldg. 339
        Monterey, CA 93943

         

        circdesk@nps.edu
        (831) 656-2947
        DSN 756-2947

        Start Your Research

        • Research Guides
        • How to Cite
        • Search Basics
        • Ask a Librarian
        • Library Liaisons
        • Graduate Writing Center
        • Thesis Processing Office
        • Statistics, Maps & More
        • Copyright at NPS

        Find & Download

        • Databases List
        • Articles, Books & More
        • NPS Theses
        • NPS Faculty Publications: Calhoun
        • Journal Titles
        • Course Reserves

        Use the Library

        • My Accounts
        • Request Article or Book
        • Borrow, Renew, Return
        • Remote Access
        • Workshops & Tours
        • For Faculty & Researchers
        • For International Students
        • For Alumni
        • Print, Copy, Scan, Fax
        • Rooms & Study Spaces
        • Floor Map
        • Computers & Software
        • Adapters, Lockers & More

        Collections

        • NPS Archive: Calhoun
        • Restricted Resources
        • Special Collections & Archives
        • Federal Depository
        • Homeland Security Digital Library

        About

        • Hours
        • Library Staff
        • About Us
        • Visit Us

        NPS-Licensed Resources - Terms & Conditions

        Copyright Notice

         
         

          Federal Depository Library  

        NPS Home Privacy Policy Copyright Accessibility Contact Webmaster