首页> 美国政府科技报告 >Modeling and Analyzing Intrusion Attempts to a Computer Network Operating in a Defense in Depth Posture
【24h】

Modeling and Analyzing Intrusion Attempts to a Computer Network Operating in a Defense in Depth Posture

机译:建模和分析入侵企图在深度姿态防御中运行的计算机网络

获取原文

摘要

In order to ensure the confidentially, integrity, and availability of networked resources operating on the Global Information Grid, the Department of Defense has incorporated a 'Defense-in-Depth' posture. This posture includes the use of network security mechanisms and does not rely on a single defense for protection. Firewalls, Intrusion Detection Systems (IDS's), Anti-Virus (AV) software, and routers are such tools used. In recent years, computer security discussion groups have included IDS's as one of their most relevant issues. These systems help identify intruders that exploit vulnerabilities associated with operating systems, application software, and computing hardware. When IDS's are utilized on a host computer or network, there are two primary approaches to detecting and/or preventing attacks. Traditional IDS's, like most AV software, rely on known 'signatures' to detect attacks. This thesis will focus on the secondary approach: Anomaly or 'behavioral based' IDS's look for abnormal patterns of activity on a network to identify suspicious behavior.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号