CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
Purdue University
Center for Education and Research in Information Assurance and Security

Reports and Papers Archive

Browse All Papers »       Submit A Paper »

White Paper: The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63

Download: PDF

This White Paper explains key elements of the Clinton Administration\‘s policy on critical infrastructure protection. It is intended for dissemination to all interested parties in both the private and public sectors. It will also be used in U.S. Government professional education institutions, such as the National Defense University and the National Foreign Affairs Training Center, for coursework and exercises on iteragency practices and procedures. Wide dissemination of this unclassified White Paper is encouraged by all agencies of the U.S. Government.

Added 2002-07-26

Hewlett-Packard IDS/9000

Information Security Magazine
Added 2002-07-26

Security of the distributed electronic patient record: a case-based approach to identifying policy issues

James G. Anderson

The growth of managed care and integrated delivery systems has created a new commodity, health information and the technology that it requires. Surveys by Deloitte and Touche indicate that over half of the hospitals in the US are in the process of implementing electronic patient record (EPR) systems. The National Research Counsil has established that industry spends as much as $15 billion on information technology (IT), an amount that is xpanding by 20% per year. The importance of collecting, electronically storing, and using the information is undisputed. This information is needed by consumers to make informed choices; by physicians to provide appropriate quality clinical care; and by health plans to assess outcomes, control costs and monitor quality. The collection, storage and communication of a large variety of personal patient data, however, present a major dilemma. How can we provide the data required by the new forms of health care delivery and at the same time protect the personal privacy of patients? Recent debates concerning medical privacy legislation, software regulation, and telemedicin suggest that this dilemma eill not be easily resolved. The problem is systematic and arises out of the routine use and flow of information throughout the health industry. Health care information is primarily transferred among authorized users. Not only is the information used for patient care and financial reimbursement, secondary users of the information include medical, nursing, and allied health education, research, social services, public health, regulation, litigation, and commercial purposes such as the development of new medical technology and marketing. The main threats to privacy and confidentiality arise from within the institutions that provide patient care as well as institutions that have access to patient data for secondary purposes.

Added 2002-07-26

Clinical Information Systems

James G. Andersen
Added 2002-07-26

1997 Computer Crime and Security Survey

Victoria Police, Office of Strategic Crime Assessments
Added 2002-07-26

Proceedings of BSDCon 2002

Added 2002-07-26

Halted Firewalls

Mike Murray
Added 2002-07-26

Defending Against Distributed Denial-of-service Attacks with Server-centric Router Throttles

David K. Y. Yau and John C. S. Lui and Feng Liang
Added 2002-07-26

Detecting Service Violations and DoS Attacks

CERIAS TR 2002-15
Ahsan Habib, Mohamed Hefeeda, Bharat Bhargava
Download: PDF

Denial of Service (DoS) attack is a serious threat for the Internet. DoS attack can consume memory, CPU, and network resources and damage or shutdown the operation of the resource under attack (victim). A common DoS attack floods a network with bogus traffic so that legitimate users may not be able to communicate. There are several proposals to {\\em traceback} the network attack path to identify the source that causes the DoS attack. This is an effective solution to trace the attacker but it is not preventive in nature. {\\em Ingress filtering} and {\\em Route-based filtering} are two proactive approaches to stop DoS attacks. These solutions check source addresses of incoming packets to ensure they are coming from legitimate sources or traversing through proper routes.  We study several existing schemes that deal with DoS attacks. We describe several network monitoring approaches to detect service violations and DoS attacks. In addition, we propose a new distributed scheme to reduce monitoring overhead. Finally, a quantitative comparison among all schemes is conducted, in which, we highlight the merits of each scheme and estimate the overhead (both computation and communication) introduced by it. The comparison provides guidelines for selecting the appropriate scheme, or a combination of schemes, based on the requirements and how much overhead can be tolerated.

Added 2002-07-26

On Vulnerability and Protection of AODV

CERIAS TR 2002-24
Weichao WANG
Download: PDF

AODV (Ad Hoc On-Demand Distance Vector) is one of the hottest routing protocols under research for Ad Hoc networks. In this technical report, we study both the strong points and vulnerabilities of AODV under internal attacks from security perspective. On the strong points, we focus on the features of combination of multicast and unicast, fast expiration of reverse route and freshness of routing information. For the vulnerabilities, we take a thorough look at various problems related to spurious RREP (Route REPly) with false distance vector and destination sequence number, malicious RREQ (Route REQuest) flooding and forge Route Error (RERR). The impacts of these vulnerabilities are simulated using NS2 and the results are shown. Among all of the vulnerabilities, the attack to destination sequence is the worst. We design and implement a protocol called Reverse Labeling Restriction Protocol (RLRP) to detect and protect the Ad Hoc network from this attack. The effectiveness of RLRP is analyzed and simulated using NS2. The results show that the protocol could effectively identify the compromised site and impressively increase the performance of the Ad Hoc network with limited overhead. We also examine the robustness of RLRP to other attacks.

Added 2002-07-26

Hacker: An intelligent learning agent

CERIAS TR 2002-25
Download: PDF

The security threats involved in any software system are due to unanticipated attacks by hackers or terrorists. Research in security concentrates on providing technical solutions to these security threats [1, 2].These solutions might not work well once the assumed attacker behavior changes. Attackers quickly understand the current security structure of the system and come up with innovative ways to achieve their objectives. In order to estimate the objectives and possible attacks, one needs to know the behavior of a hacker. This report proposes the design for the simulation of a hacker as an intelligent learning agent, which can be used to observe the behavior change patterns and enhance the existing solutions to security threats. The design supports the following: 1) The hacker learns from his experience and also from the information provided by the other hackers. 2) The mistrust component is used to decide on the extent to which the information provided by other hackers can be relied upon.

Added 2002-07-26

On-Demand Media Streaming Over the Internet

CERIAS TR 2002-20
Mohamed M. Hefeeda, Bharat K. Bhargava, and David K. Y. Yau
Download: PDF

Whether the server entity is centralized or distributed over a set of delegates (caches/proxies), the client/server paradigm for media streaming services stresses the server to the limit by having it serving each and every client in the system. Such a paradigm dictates an enormous—-and likely unattainable—-investment in deploying numerous caches/proxies in order to provide media services to large Internet-scale customers.

We envision a cooperative peer-to-peer paradigm as a potential solution for such a fundamental problem.  We propose a novel peer-to-peer media distribution model   that scales well to a large number of clients with a modest overall system cost. We describe the advantages as well as the challenges facing   the proposed model. We present the details of the model including: how the overall system is initially formed, how the system evolves as more peers join, and how peers help each other to provide the streaming service.  We evaluate various aspects of the proposed model through an extensive simulation study.

Added 2002-07-26