Reports and Papers Archive

Page Content


Browse All Papers »       Submit A Paper »

Computer Vulnerability Analysis Thesis Proposal

COAST TR 97-05
Krsul, I.
Download:
Added 1900-01-01

Sequence Matching and Learning in Anomaly Detection for Computer Security

COAST TR 97-04
Lane, T., Brodley, C.
Download:
Added 1900-01-01

An Application of Machine Learning to Anomaly Detection

COAST TR 97-03
Lane, T., Brodley, C.
Download:
Added 1900-01-01

Tamper Resistance - a Cautionary Note

COAST TR 96-08
Anderson, R., Kuhn, M.
Download: PDF
Added 1900-01-01

A Reference Model For Firewall Technology And Its Implications For Connection Signaling

COAST TR 96-07
Lyles, J., Schuba, C.
Download:
Added 1900-01-01

Authorship Analysis: Identifying The Author of a Program

COAST TR 96-06
Krsul, I., Spafford, E.
Download:
Added 1900-01-01

17th IEEE Symposium on Security and Privacy, Report on the

COAST TR 96-03
Schuba, Christoph L. and Zurko Mary Ellen
Download:
Added 1900-01-01

A Taxonomy Of Security Faults In The Unix Operating System

COAST TR 95-09
Aslam, T.
Download:

Security in computer systems is important to ensure reliable operation and protect the integrity of stored information.  Faults in the implementation can be exploited to breach security and penetrate an operating system.  These faults must be identified, detected, and corrected to ensure reliability and safe-guard against denial of service, unauthorized modification of data, or disclosure of information. We define a classification of security faults in the Unix operating system.  We state the criteria used to categorize the faults and present examples of the different fault types. We present the design and implementation details of a database to store vulnerability information collected from different sources.  The data is organized according to our fault categories.  the information in the database can be applied in static audit analysis of systems, intrusion detection, and fault detection.  We also identify and describe software testing methods that should be effective in detecting different faults in our classification scheme.

Added 1900-01-01

Classification and Detection of Computer Intrusions

COAST TR 95-08
Kumar, S.
Download: PDF
Added 1900-01-01

Classical IP and ARP over ATM

COAST TR 95-07
Schuba, C., Kercheval, B., Spafford, E.
Download: PDF
Added 1900-01-01

A Pattern Matching Model For Misuse Intrusion Detection

COAST TR 95-06
Kumar, S., Spafford, E.
Download: PDF
Added 1900-01-01

Applying Genetic Programming to Intrusion Detection

COAST TR 95-05
Crosbie, M., Spafford, E.
Added 1900-01-01

A Software Architecture to Support Misuse Intrusion Detection

COAST TR 95-04
Kumar, S., Spafford, E.
Download: PDF
Added 1900-01-01