Show simple item record

dc.contributor.advisorBordetsky, Alex
dc.contributor.advisorRoth, Joe
dc.contributor.authorGivens, Mark Allen
dc.date.accessioned2012-03-14T17:31:44Z
dc.date.available2012-03-14T17:31:44Z
dc.date.issued2004-09
dc.identifier.urihttp://hdl.handle.net/10945/1421
dc.description.abstractIn order to ensure the confidentially, integrity, and availability of networked resources operating on the Global Information Grid, the Department of Defense has incorporated a "Defense-in-Depth" posture. This posture includes the use of network security mechanisms and does not rely on a single defense for protection. Firewalls, Intrusion Detection Systems (IDS's), Anti-Virus (AV) software, and routers are such tools used. In recent years, computer security discussion groups have included IDS's as one of their most relevant issues. These systems help identify intruders that exploit vulnerabilities associated with operating systems, application software, and computing hardware. When IDS's are utilized on a host computer or network, there are two primary approaches to detecting and / or preventing attacks. Traditional IDS's, like most AV software, rely on known "signatures" to detect attacks. This thesis will focus on the secondary approach: Anomaly or "behavioral based" IDS's look for abnormal patterns of activity on a network to identify suspicious behavior.en_US
dc.description.urihttp://archive.org/details/modelingndnalyzi109451421
dc.format.extentxvi, 91 p. : ill. (some col.) ;en_US
dc.publisherMonterey California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.subject.lcshComputer networksen_US
dc.subject.lcshSecurity measuresen_US
dc.subject.lcshUnited Statesen_US
dc.subject.lcshFirewalls (Computer security)en_US
dc.titleModeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth postureen_US
dc.typeThesisen_US
dc.contributor.corporateNaval Postgraduate School (U.S.).
dc.contributor.departmentInformation Sciences (IS)
dc.description.serviceMajor, United States Marine Corpsen_US
etd.thesisdegree.nameM.S. in Information Technology Managementen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineInformation Technology Managementen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
etd.verifiednoen_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record