The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

NPS CISR: A Center of Excellence in Information Assurance

Naval Postgraduate School
Added 2002-07-26

Practices for Securing Critical Information Assets

Critical Infrastructure Assurance Office
Added 2002-07-26

Digital Government Security Infrastructure Design Challenges

CERIAS TR 2001-31
James Joshi, Arif Ghafoor, Walid G. Aref, Eugene Spafford
Download: PDF

Deisgning security systems for a digital government’s multidomain environment requires a careful balancing act between providing convenient access and carefully monitoring permissions.

Added 2002-07-26

The Ongoing March Toward Digital Government

CERIAS TR 2001-22
Ahmed K. Elmagarmid, William J. McIver Jr.

Despite occasional setbacks, digital government projects now appear firmly on the road to fulfilling their promise of making civil and political processes mor eaccessible than ever.

Added 2002-07-26



On Defending Against Distributed Denial-of-service Attacks with Server-centric Router Throttles

CERIAS TR 2001-39
Feng Liang and David K. Y. Yau and John C. S. Lui
Download: PDF
Added 2002-07-26

Information assurance in networked enterprises: definition, requirements and experimental results

CERIAS TR 2001-34
Bellocci T., Ang C.B., Ray P. and Nof S.Y.
Download: PDF

With the dramatic growth of information exchanges within and between organizations, major concerns emerge about the assurance of information.  Without clear knowledge of the true needs for information assurance, a company may employ local, specialized solutions that are too restrictive, or nor comprehensive.  On the other hand, cost-effective, variable integrity and variable security may be economically justifiable and adequate for ertain situations and decisions.  Therefore, a new definition of information assurane has been developed following the TQM approach.  It describes assurance as a combination of information security, integrity, and significance. The requirements of information assurance are presented and have been justified on the basis of concrete results obtained from the lab experiments that were conducted.  The exeriments and results have been briefly discussed in this paper.

Added 2002-07-26

Information assurance: MICSS Lab experiments, results and analysis

CERIAS TR 2001-35
Bellocci T., Ray P. and Nof S.Y.
Download: PDF

A lab experiment has been perfrmed using an ERP simulator to study the impact of information failure on the results of a company.  Two scenerios have been considered: correct but delayed information, and wrong information.  The influence of the length of delay, of the error size, and of the dataet concerned by the failure have also been studied.  It follows from the analysis that: -The consequences of a given information failure depend on the dataset in which the failure occurs. -For a given dataset, information failures impact depends on the failure type. -The influence of the length of delay depends on the dataset. -The influence of the error size depends on the dataset. So far companies employ local, specialized solutions that are too restrictive, or not compehensive.  The experiments presented in this paper justify economically the use of solutions with variable assurance in ERP sysems.  They also provide directions for the design of autonomous agents to handle these assurance problems.

Added 2002-07-26


Information assurance: MICSS Class experiments, and industry survey conclusions

CERIAS TR 2001-37
Ray P., Bellocci T. and Nof S.Y.
Download: PDF
Added 2002-07-26

Information assurance: MICSS Class experiments, analysis and conclusions

CERIAS TR 2001-38
Ray P., Bellocci T. and Nof S.Y.
Download: PDF
Added 2002-07-26

Hacker Challenges in Security Product Testing

Eugene Spafford
Added 2002-07-26

State of the Practice of Intrusion Detection Technologies

Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, Ed Stoner
Added 2002-07-26

On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets

CERIAS TR 2001-40
Kihong Park and Heejo Lee
Download: PDF

Denial of service (DoS)attack on the Internet has become a pressing problem.In this paper,we describe and evaluate route-based distributed packet .ltering (DPF),a novel ap- proach to distributed DoS (DDoS)attack prevention.We show that DPF achieves proactiveness and scalability,and we show that there is an intimate relationship between the e .ectiveness of DPF at mitigating DDoS attack and power- law network topology.

Added 2002-07-26