
Early Warning and Prediction of Internet Attacks and Exploits
Versandkostenfrei!
Versandfertig in über 4 Wochen
15,99 €
inkl. MwSt.
PAYBACK Punkte
8 °P sammeln!
A safe, secure and functional information network is vital in today's Air Force net centric environment. Information is more critical today than it has ever been. As more operational functions are placed in cyber space and greater computing power becomes available to everyone, keeping these networks safe and secure is an almost unattainable task. Network security entails Intrusion Detection Security, but another form of security or "insecurity" is quickly gaining attention. Honeypots allow the black hat community to attack and penetrate non-production systems. By monitoring and studying these ...
A safe, secure and functional information network is vital in today's Air Force net centric environment. Information is more critical today than it has ever been. As more operational functions are placed in cyber space and greater computing power becomes available to everyone, keeping these networks safe and secure is an almost unattainable task. Network security entails Intrusion Detection Security, but another form of security or "insecurity" is quickly gaining attention. Honeypots allow the black hat community to attack and penetrate non-production systems. By monitoring and studying these attacks, network defenders can develop better Information Assurance tactics and procedures to defend their networks. The ability to quickly analyze only those data packets predicted to be an exploit and disregard the remaining packets is crucial in today's overworked environment. Using an accredited Honeypot, an Exploit Prediction System (EPS) is developed using a decision-tree matrix. The EPS provides an excellent tool in choosing only those data packets needing further analysis. The EPS employs as few criterion needed for successful prediction. The log data coming into the honeypot is not filtered and all incoming log data is captured, interpreted and categorized. This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.