Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Theses/Dissertations

2010

Data protection

Articles 1 - 2 of 2

Full-Text Articles in Engineering

A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator, Justin M. Myers Jun 2010

A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator, Justin M. Myers

Theses and Dissertations

Log event correlation is an effective means of detecting system faults and security breaches encountered in information technology environments. Centralized, database-driven log event correlation is common, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. This research presents a distributed event correlation system which performs security event detection, and compares it with a centralized alternative. The comparison measures the value in distributed event correlation by considering network bandwidth utilization, detection capability and database query efficiency, as well as through the implementation of remote configuration scripts and correlation …


Component Hiding Using Identification And Boundary Blurring Techniques, James D. Parham Jr. Mar 2010

Component Hiding Using Identification And Boundary Blurring Techniques, James D. Parham Jr.

Theses and Dissertations

Protecting software from adversarial attacks is extremely important for DoD technologies. When systems are compromised, the possibility exists for recovery costing millions of dollars and countless labor hours. Circuits implemented on embedded systems utilizing FPGA technology are the result of downloading software for instantiating circuits with specific functions or components. We consider the problem of component hiding a form of software protection. Component identification is a well studied problem. However, we use component identification as a metric for driving the cost of reverse engineering to an unreasonable level. We contribute to protection of software and circuitry by implementing a Java …