Ellis et al., 2000 - Google Patents
TECHNICAL REPORT CMU/SEI-99-TR-028 ESC-99-028Ellis et al., 2000
View PDF- Document ID
- 10152350901806242519
- Author
- Ellis J
- Hayes E
- Marella J
- Willke B
- Publication year
- Publication venue
- ESC
External Links
Snippet
Attacks on the nation's computer infrastructures are a serious problem. Over the past 12 years, the growing number of computer security incidents on the Internet has reflected the growth of the Internet itself. Because most deployed computer systems are vulnerable to …
- 238000001514 detection method 0 abstract description 194
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Allen et al. | State of the practice of intrusion detection technologies | |
| Bace et al. | NIST special publication on intrusion detection systems | |
| Bace et al. | Intrusion detection systems | |
| Bejtlich | The Tao of network security monitoring: beyond intrusion detection | |
| Ask et al. | Advanced persistent threat (APT) beyond the hype | |
| Priyadarshini | Introduction on cybersecurity | |
| Stewart | CompTIA Security+ Review Guide: Exam SY0-601 | |
| Ghosh et al. | Cybercrimes: a multidisciplinary analysis | |
| Rawal et al. | Cybersecurity and identity access management | |
| Fry et al. | Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks | |
| Kant | How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning | |
| Bhardwaj et al. | Machine learning and artificial intelligence for detecting cyber security threats in iot environmment | |
| Karie et al. | Cybersecurity incident response in the enterprise | |
| Bendiab et al. | IoT Security Frameworks and Countermeasures | |
| Javaid | Cyber security: Challenges ahead | |
| Irwin | Double-edged sword: dual-purpose cyber security methods | |
| Akinola et al. | Introduction to Cyber-security | |
| Ellis et al. | TECHNICAL REPORT CMU/SEI-99-TR-028 ESC-99-028 | |
| Melhem et al. | Strengthening Health Care Networks: A Security Model for Enhanced Cyber Resilience Using Hybrid Honeypots | |
| Bhalla | Is the mouse click mighty enough to bring society to its knees? | |
| Akinsola et al. | Network Vulnerability Analysis for Internet of Things (IoT)-based Cyber Physical Systems (CPS) Using Digital Forensics | |
| Rowell | Cyber indicators of compromise: a domain ontology for security information and event management | |
| Rahman et al. | Strengthening ICS Attack Resiliency: Advanced Incident Response, Threat Intelligence, and Cyber-Physical Systems Monitoring | |
| Wiklund | Masquerader Detection via 2fa Honeytokens | |
| Troshani | HONEYPOT SYSTEMS |