Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Using Mobile Agents for Analyzing Intrusion in Computer Networks Jay Aslam Marco Cremonini David Kotz Daniela Rus
 

Summary: Using Mobile Agents for Analyzing Intrusion in Computer Networks
Jay Aslam Marco Cremonini David Kotz Daniela Rus
Department of Computer Science, Institute for Security Technology Studies
Dartmouth College
Hanover, NH 03755
Today hackers disguise their attacks by launching
them form a set of compromised hosts distributed
across the Internet. It is very difficult to defend
against these attacks or to track down their origin.
Commercially available intrusion detection systems
can signal the occurrence of limited known types of at-
tacks. New types of attacks are launched regularly but
these tools are not effective in detecting them. Human
experts are still the key tool for identifying, tracking,
and disabling new attacks. Often this involves experts
from many organizations working together to share
their observations, hypothesis, and attack signatures.
Unfortunately, today these experts have few tools that
help them to automate this process.
In this project we recognize that human experts

  

Source: Aslam, Javed - College of Computer Science, Northeastern University
Kotz, David - Department of Computer Science, Dartmouth College

 

Collections: Computer Technologies and Information Sciences