Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Dartmouth College

2001

Security

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Using Mobile Agents For Analyzing Intrusion In Computer Networks, Jay Aslam, Marco Cremonini, David Kotz, Daniela Rus Jul 2001

Using Mobile Agents For Analyzing Intrusion In Computer Networks, Jay Aslam, Marco Cremonini, David Kotz, Daniela Rus

Dartmouth Scholarship

Today hackers disguise their attacks by launching them form a set of compromised hosts distributed across the Internet. It is very difficult to defend against these attacks or to track down their origin. Commercially available intrusion detection systems can signal the occurrence of limited known types of attacks. New types of attacks are launched regularly but these tools are not effective in detecting them. Human experts are still the key tool for identifying, tracking, and disabling new attacks. Often this involves experts from many organizations working together to share their observations, hypothesis, and attack signatures. Unfortunately, today these experts have …