Didier Contis

Learn More
The current generation of centralized network intrusion detection systems (NIDS) have various limitations on their performance and effectiveness. In this paper, we argue that intrusion detection analysis should be distributed to network node IDS (NNIDS) running in hardware on the end hosts. An NNIDS can unambiguously inspect traffic to and from the host,(More)
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mechanism at their connection to the Internet. Large Enterprise Networks, such as the network for a major university, are very inviting targets to hackers who are looking to exploit(More)
—An undergraduate internetwork, security-teaching laboratory, which includes both defensive and offensive security laboratory experimentation, is described. This laboratory is oriented toward an introductory internetworking security class and is intended to complement more theoretical network security classes while sparking student interest. The laboratory(More)
  • 1