[go: up one dir, main page]

Ellis et al., 2000 - Google Patents

TECHNICAL REPORT CMU/SEI-99-TR-028 ESC-99-028

Ellis et al., 2000

View PDF
Document ID
10152350901806242519
Author
Ellis J
Hayes E
Marella J
Willke B
Publication year
Publication venue
ESC

External Links

Snippet

Attacks on the nation's computer infrastructures are a serious problem. Over the past 12 years, the growing number of computer security incidents on the Internet has reflected the growth of the Internet itself. Because most deployed computer systems are vulnerable to …
Continue reading at markowsky.us (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices

Similar Documents

Publication Publication Date Title
Allen et al. State of the practice of intrusion detection technologies
Bace et al. NIST special publication on intrusion detection systems
Bace et al. Intrusion detection systems
Bejtlich The Tao of network security monitoring: beyond intrusion detection
Ask et al. Advanced persistent threat (APT) beyond the hype
Priyadarshini Introduction on cybersecurity
Stewart CompTIA Security+ Review Guide: Exam SY0-601
Ghosh et al. Cybercrimes: a multidisciplinary analysis
Rawal et al. Cybersecurity and identity access management
Fry et al. Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
Kant How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning
Bhardwaj et al. Machine learning and artificial intelligence for detecting cyber security threats in iot environmment
Karie et al. Cybersecurity incident response in the enterprise
Bendiab et al. IoT Security Frameworks and Countermeasures
Javaid Cyber security: Challenges ahead
Irwin Double-edged sword: dual-purpose cyber security methods
Akinola et al. Introduction to Cyber-security
Ellis et al. TECHNICAL REPORT CMU/SEI-99-TR-028 ESC-99-028
Melhem et al. Strengthening Health Care Networks: A Security Model for Enhanced Cyber Resilience Using Hybrid Honeypots
Bhalla Is the mouse click mighty enough to bring society to its knees?
Akinsola et al. Network Vulnerability Analysis for Internet of Things (IoT)-based Cyber Physical Systems (CPS) Using Digital Forensics
Rowell Cyber indicators of compromise: a domain ontology for security information and event management
Rahman et al. Strengthening ICS Attack Resiliency: Advanced Incident Response, Threat Intelligence, and Cyber-Physical Systems Monitoring
Wiklund Masquerader Detection via 2fa Honeytokens
Troshani HONEYPOT SYSTEMS