The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

A Generic Virus Scanner in C++

Sandeep Kumar and E. H. Spafford;
Download: PDF
Added 2002-07-26

An Application of Pattern Matching in Intrusion Detection

CSD-TR-94-013
Sandeep Kumar and E. H. Spafford
Download: PDF
Added 2002-07-26

A Pattern-Matching Model for Misuse Instrusion Detection

Sandeep Kumar and E. H. Spafford;
Download: PDF
Added 2002-07-26

A Software Architecture to Support Misuse Instrusion Detection

CSD-TR-95-009
Sandeep Kumar and E. H. Spafford
Download: PDF
Added 2002-07-26

Generation of Application Level Audit Data via Library Interposition

COAST TR 98-17
Benjamin A. Kuperman, E. H. Spafford
Download: PDF
Added 2002-07-26

Temporal Sequence Learning and Data Reduction for Anomaly Detection

COAST TR 98-18
Terran Lane, Carla E. Brodley
Download: PDF
Added 2002-07-26

Filtering Techniques for Rapid User Classification

COAST TR 98-13
Terran Lane, Carla E. Brodley
Download: PDF
Added 2002-07-26



A Reference Model for Firewall Technology and its Implications for Connection Signaling

CSD-TR-94-061
J. Bryan Lyles and Christoph L. Schuba
Download: PDF
Added 2002-07-26

Data Quality in Security Outsourcing of Scientific Computations

COAST TR 98-19
John R. Rice and Chieh-Hsien Tiao
Download: PDF
Added 2002-07-26

Networked Agents for Scientific Computing

COAST TR 98-16
Tzvetan Drashansky, Elias N. Houstis, Naren Ramakrishnan, John R. Rice
Download: PDF
Added 2002-07-26

A New Approach to the Specification of Computer Security Poilicies

Ivan Krsul, Eugene Spafford, Tugkan Tuglular
Added 2002-07-26

An Architecture for Intrusion Detection using Autonomous Agents

COAST TR 98-05
J. Balasubramaniyan, J. Garcia-Fernandex, D. Isacoff, E. Spafford, D. Zamboni
Download: PDF

The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or effeciencey.  The most common shortcoming in the existing architectures is that they are built around a single monolithic entity that does most of the data collection and processing.  In this paper, we review our architecture for a distributed Intrusion Detection System based on multiple independent entities working collectively.  We call these entities Autonomous Agents.  This approach solves some of the problems previously mentioned.  We present the motivation and description of the approach, partial results obtained from an early prototype, a discussion of design and implementation issues, and directions for future work.

Added 2002-07-26

Database Support for Intrusion Detection

M. J. Atallah, S. Prabhakar, S. Mandujano, M. Karpiak, S. Sandhir
Added 2002-07-26