The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Next-generation Intrusion Detection Expert System (NIDES) - a summary

Debra Anderson,Thane Frivold,Alfonso Valdes

Exsisting security mechanisms protect computers and networks from unauthorized use through access controls, such as passwords. However, if these access controls are compromised or can be bypassed, an abuser may gain unauthorized access an thus can cause great damage and disruption to systems operation. Modes of protection can be devised against this, however, an intruder is likely to exhibit behavior patterns different than that of a legitimate user. While many systems collect audit data, most do not have any capability for automated analysis of that data. Moreover, those that do collect audit data generally collect large volumes of data that are not necessarily security relevant. Thus, for security analysis, a security officer (SO) must wade through stacks of printed output of audit data. Thus, the capability for automated security analysis of audit trails is needed. The Next-generation Intrusion-Detection Expert System (NIDES) is the result of research that started in the Computer Science Laboratory at SRI International in the early 1980’s and led to a series of increaslingly sophisticated prototypes that resulted in the current NIDES Beta release. The current version, described in this final report and in greater detail in [1,2,3], is designed to operate in real time to detect instruions as they occur. NIDES is a comprehensive system that uses innovative statistical algorithms for anomaly detection, as well as an expert system that encodes known intrusion scenarios.

Added 2002-07-26

General Procedures for Registering Coomputer Security Objects

Noel A. Nazario, ed. Us. Department of Commerce
Added 2002-07-26

The Seaview Formal Security Policy Model

Teresa F. Lunt, Dorothy E. denning, Roger R. schell, Mark Heckman, William R. Shockley

This report describes a formal security policy model for a secure relational database system.  This model is intended to meet the formal model requirement specified in the DoD Trusted Computer System Evaluation criteria.  The model is formulated in two layers, one corresponding to a reference monitor that enforces mandatory security, and the second defining multilevel relations and formalizing policies for labeling new and derived data, data consistency, discretionary security, and transaction consistency.  The development of a formal security policy model is the second task of the SeaView project to design a multilevel secure database system meeting the Criteria for Class A1.

Added 2002-07-26

Use of A Taxonomy of Security Faults

Taimur Aslam,Ivan Krsul,Eugene Spafford
Download: PDF
Added 2002-07-26

Encryption and the Global Information Infrat

Steve Orlowski
Added 2002-07-26

Why Driver Privacy Must be a part of ITS

Simpson L. Garfinkel
Added 2002-07-26

Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI

L. Brown,M. Kwan,J. Pieprzyk,J. Seberry
Added 2002-07-26

FunnelWeb User's Manual

Ross N. Williams
Added 2002-07-26

Exposure Draft of the Generally Accepted System Security Principles (GSSP)

GSSP/ISSA

Generally Accepted System Security Principles incorporate the consensus at a particular times as to the practices, conventions, rules, mechanisms, and procedures that 1) information security professionals should employ, or that 2) information processing products should provide, to achieve, preserve, and restore the properties of integrity, availability, and confidentiality of information and information systems. GSSP is a technical security term encompassing the practices, conventions, rules, mechanisms, and procedures that are needed to define accepted security practice at a particular time. It includes broad guidlines and detailed practices and procedures.

Added 2002-07-26

Endorsements, Licensing, and Insurance for Distributed System Services

Charlie Lai,Gennady Medvinsky,B. Clifford Neuman
Added 2002-07-26

Proyecto UNAM/Cray de Seguridad en el Sistema Operativo Unix

Diego Martin Zamboni
Added 2002-07-26

Probing TCP Implementations

Douglas E. Comer,John C. Lin
Added 2002-07-26

Yacc: Yet Another Compiler-Compiler

Stephen C. Johnson
Added 2002-07-26

Lex - A Lexical Analyzer Generator

M. E. Lesk,E. Schmidt
Added 2002-07-26

Security Schemes Aspire to No-Fuss System Protection

Charles C. Mann
Added 2002-07-26