Dedication To the Babs for having such patience when I was so far away, and to my dearest Folks for getting me this far. Abstract This dissertation explores an immunological model of distributed detection, called negative detection , and studies its performance in the domain of intrusion detection on computer networks. The goal of the detection system is to… (More)
This report presents a prototype architecture for an active derense mechanism for computer systems. The intrusion detection problem is introduced and some of the key aspects of any solution arc explained. Previous allempts to use similar techniques are discussed, and their shortcomings are explained. A new architecture is proposed which uses Genetic… (More)
This paper deals with network security assessment. We discuss currently available network security assessment tools and provide a categorization of their limitations. We revisit the methodology that the tools are based on, the flaw-hypothesis testing methodology. We then discuss the application of the methodology to network security assessment and discuss… (More)
The online truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards. ACKNOWLEDGMENTS I am grateful for the continuous guidance and invaluable advice provided by Zeki Erkin and Christian Doerr, without whom this thesis would not have occurred. I would also like to express my sincere… (More)
This paper is a republication of an original blog post by Gene Spafford with a title of the same name. It includes comments on the general lack of women in the computing subfield of cybersecurity and advice for both men and women. The original blog posting can be found at https://www.cerias.purdue.edu/site/blog/post/were_out_of_balance/
ii ACKNOWLEDGMENTS Special thanks to Prof. Saurabh Bagchi and my colleague Bingrui Foo without whose efforts and input this work would not have made its way. Also thanks to Prof.