Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Using Mobile Agents for Analyzing Intrusion in Computer Networks # Jay Aslam Marco Cremonini David Kotz Daniela Rus +
 

Summary: Using Mobile Agents for Analyzing Intrusion in Computer Networks #
Jay Aslam Marco Cremonini David Kotz Daniela Rus +
Department of Computer Science, Institute for Security Technology Studies
Dartmouth College
Hanover, NH 03755
Today hackers disguise their attacks by launching
them form a set of compromised hosts distributed
across the Internet. It is very di#cult to defend
against these attacks or to track down their origin.
Commercially available intrusion detection systems
can signal the occurrence of limited known types of at­
tacks. New types of attacks are launched regularly but
these tools are not e#ective in detecting them. Human
experts are still the key tool for identifying, tracking,
and disabling new attacks. Often this involves experts
from many organizations working together to share
their observations, hypothesis, and attack signatures.
Unfortunately, today these experts have few tools that
help them to automate this process.
In this project we recognize that human experts

  

Source: Aslam, Javed - College of Computer Science, Northeastern University
Dartmouth College, Department of Computer Science, Computer Engineering Group. D'Agents Team

 

Collections: Computer Technologies and Information Sciences