File:Real-time intrusion detection for Windows NT based on Navy IT-21 audit policy (IA realtimeintrusio1094513694).pdf
Original file (1,275 × 1,650 pixels, file size: 2.01 MB, MIME type: application/pdf, 62 pages)
Captions
Summary edit
Real-time intrusion detection for Windows NT based on Navy IT-21 audit policy ( ) | ||
---|---|---|
Author |
Kremer, H. Steven |
|
Title |
Real-time intrusion detection for Windows NT based on Navy IT-21 audit policy |
|
Publisher |
Monterey, California: Naval Postgraduate School |
|
Description |
A Navy directive orders the migration of Navy computer systems to an Internet-connected network of Windows NT workstations and servers. Windows NT possesses the security features of a class C2 computer system but does not offer a standard real-time host-based tool to process the security-event audit data to detect intrusions or misuse. We discuss what would entail in general. We also report on experiments with a sensor program, which resides on each workstation and server in the network and provides some real-time processing of NT host- based events. It passes information to an Agent that communicates to other Agents in the network, in an effort to identify and respond to an intrusion into the network. The Navy audit policy and the methods of implementing the policy are also investigated in this thesis. Subjects: |
|
Language | English | |
Publication date |
September 1999 publication_date QS:P577,+1999-09-00T00:00:00Z/10 |
|
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
|
Accession number |
realtimeintrusio1094513694 |
|
Source | ||
Permission (Reusing this file) |
Approved for public release, distribution unlimited. |
Licensing edit
Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 05:01, 24 July 2020 | 1,275 × 1,650, 62 pages (2.01 MB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection realtimeintrusio1094513694 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #26040) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | Real-time intrusion detection for Windows NT based on Navy IT-21 audit policy |
---|---|
Author | Kremer, H. Steven |
Software used | Kremer, H. Steven |
Conversion program | Acrobat Distiller Daemon 3.01 for Solaris 2.3 and later (SPARC) |
Encrypted | no |
Page size | 612 x 792 pts (letter) |
Version of PDF format | 1.4 |