Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman
Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman
Theses and Dissertations
The Department of Defense (DoD) relies heavily on the Non-secure Internet Protocol Router Network (NIPRNET) to exchange information freely between departments, services, bases, posts, and ships. The NIPRNET is vulnerable to various attacks, to include physical and cyber attacks. One of the most frequently used cyber attacks by criminally motivated hackers is a Distributed Denial of Service (DDoS) attack. DDoS attacks can be used to exhaust network bandwidth and router processing capabilities, and as a leveraging tool for extortion. Border Gateway Protocol (BGP) black hole routing is a responsive defensive network technique for mitigating DDoS attacks. BGP black hole routing …
An Analysis Of Biometric Technology As An Enabler To Information Assurance, Darren A. Deschaine
An Analysis Of Biometric Technology As An Enabler To Information Assurance, Darren A. Deschaine
Theses and Dissertations
The use of and dependence on, Information technology (IT) has grown tremendously in the last two decades. Still, some believe the United States is only in the infancy of this growth. This explosive growth has opened the door to capabilities that were only dreamed of in the past. As easy as it is to see how advantageous this technology is, it also is clear that with its advantages come distinct responsibilities and new problems that must be addressed. For instance, the minute one begins using information processing systems, the world of information assurance (IA) becomes far more complex. As a …
Assessing The Usefulness Of Visualization Tools To Investigate Hidden Patterns With Insider Attack Cases, Amy M. Rammel
Assessing The Usefulness Of Visualization Tools To Investigate Hidden Patterns With Insider Attack Cases, Amy M. Rammel
Theses and Dissertations
The insider threat is a major concern for organizations. Open markets, technological advances, and the evolving definition of employee have exacerbated the insider threat. Insider threat research efforts are focusing on both prevention and detection techniques. However, recent security violation trends highlight the damage insider attacks cause organizations and illuminate why organizations and researchers must develop new approaches to this challenge. Although fruitful research is being conducted and new technologies are being applied to the insider threat problem, companies remain susceptible to the costly damage generated by insider threat actions. This research explored how visualization tools may be useful in …
National Security Agency (Nsa) Systems And Network Attack Center (Snac) Security Guides Versus Known Worms, Matthew W. Sullivan
National Security Agency (Nsa) Systems And Network Attack Center (Snac) Security Guides Versus Known Worms, Matthew W. Sullivan
Theses and Dissertations
Internet worms impact Internet security around the world even though there are many defenses to prevent the damage they inflict. The National Security Agency (NSA) Systems and Network Attack Center (SNAC) publishes in-depth configuration guides to protect networks from intrusion; however, the effectiveness of these guides in preventing the spread of worms hasn't been studied. This thesis establishes how well the NSA SNAC guides protect against various worms and exploits compared to Microsoft patches alone. It also identifies the aspects of the configuration guidance that is most effective in the absence of patches and updates, against network worm and e-mail …