- Full text PDF available (9)
There is widespread concern that large-scale malicious attacks on computer networks could cause serious disruption to network services. We present the design of GrIDS Graph-Based Intrusion Detection System. GrIDS collects data about activity on computers and network traac between them. It aggregates this information into activity graphs which reveal the… (More)
– Computer attacks are typically described in terms of a single exploited vulnerability or as a signature composed of a specific sequence of events. These approaches lack the ability to characterize complex scenarios or to generalize to unknown attacks. Rather than think of attacks as a series of events, we view attacks as a set of capabilities that provide… (More)
Recently there has been an influx of work on extending a wireless sensor networks lifetime by distributing source compression and deploying non-homogeneous nodes to handle the aggregation. Both of these mechanisms have been shown to increase the network's lifetime, but they each have requirements that might not be plausible. With distributed source… (More)
This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss issues and technologies related to intrusion detection and defense. This year, we are pleased to be holding RAID in conjunction with VizSec 2008. Limited accommodations for RAID attendees are available at the Boston Marriott Cambridge.
We give an overview of data security issues for the smart electrical grid. In the recent past, the electrical power system has experienced unexpected, large-scale, cascading failures initiated by relatively small failures (which may be deliberately caused in the future), and market manipulation (a well-known example of which is Enron's manipulation of the… (More)
Zuck for helping to coordinate the work, and all the workshop participants for excellent contributions. The views expressed in this report are the authors' and do not necessarily represent those of the National Science Foundation.
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of this address is not verified by the protocol. The IP protocol specifies no method for validating the authenticity of the packet's source. This implies that an attacker can forge the… (More)
Submission Window Date(s) (due by 5 p.m. proposer's local time): ● This solicitation covers programs that cut across all three divisions in CISE, seeking proposals that are scientifically timely, and that benefit from the intellectual contributions of researchers with expertise in a number of computing fields and/or sub-fields. ● This is a multi-year… (More)