Active Systems Management : The Evolution of Firewalls

@inproceedings{Arbaugh2002ActiveSM,
  title={Active Systems Management : The Evolution of Firewalls},
  author={William A. Arbaugh},
  year={2002}
}
For over twenty-five years, the security community has focused on improving security, and yet information systems remain as vulnerable as ever (perhaps more so). A perfect example of this is the (first intrusion occurred on July 10, 2001 and peaked on July 19, 2001) code red worm which automatically exploits a vulnerability in Microsoft’s Internet Information Server (IIS). Following a successful exploitation of a host, the worm propagates by scanning for other vulnerable hosts to infect. Nine… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 12 REFERENCES

The Internet Auditing Project ( beta 1 )

  • W. Arbaugh
  • Using Independent Auditors as Intrustion…
  • 1997

The Essence of Winning and Losing.

  • J. R. Boyd
  • http://www.belisarius.com/modern business…
  • 1995
1 Excerpt

Similar Papers

Loading similar papers…