Show simple item record

dc.contributor.authorLabbe, Keith G.
dc.contributor.authorRowe, Neil C.
dc.contributor.authorFulp, J.D.
dc.dateJune 21-23, 2006
dc.date.accessioned2013-09-20T16:16:29Z
dc.date.available2013-09-20T16:16:29Z
dc.date.issued2006-06
dc.identifier.citationProceedings of the 7th IEEE Workshop on Information Assurance, West Point, NY, June 21-23 2006.
dc.identifier.urihttp://hdl.handle.net/10945/36568
dc.descriptionThis paper appeared in the Proceedings of the 7th IEEE Workshop on Information Assurance, West Point, NY, June 21-23 2006.en_US
dc.description.abstractHost-based intrusion-prevention systems are currently popular technologies which try to prevent exploits from succeeding on a host. They are like host-based intrusion-detection systems [1] but include means to automatically take actions once malicious activities or code are discovered. This can include terminating connections, services, or ports; refusing commands; blocking packets from specific Internet addresses; initiating tracing of packets; and sending modified packets back to a user. Automated responses to exploits can be quick without human intervention. Around ten commercial vendors are currently offering intrusion-prevention products [2], and Snort-Inline [3] is a popular open-source tool. Total intrusion prevention is a difficult goal to achieve, since it takes time to recognize an exploit and by then the damage may be done. So it is important to have a way to test the often-broad claims of intrusion-prevention products.en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsApproved for public release, distribution unlimiteden_US
dc.titleA Methodology for Evaluation of Host-Based Intrusion Prevention Systems and Its Applicationen_US
dc.typeConference Paperen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record