Security Library

Welcome to Raptor Systems' Security Library

Files NOW available in PDF format. To view the PDF format you need to download Adobe Acrobat Reader. Download. It is free!

If you have problems viewing the documents please let me know.

kcarberry@raptor.com


The Internet Worm: An Analysis
Spafford
Format: postscript, 283kb  
Format: PDF
OPUS: Preventing Weak Password Choices
Spafford
Format: postscript, 48kb
Format: PDF
Software Forensics: Can We Track Code to Its Authors?
Spafford/Weeber
Format: postscript, 56kb  
Format: PDF
A Generic Virus Scanner in C++
Kumar/Spafford
Format: postscript, 109kb  
Format: PDF
The Design and Implementation of TripWire: A Filesystem Integrity Checker
Kim/Spafford
Format: postscript, 222kb  
Format: PDF
An Application of Pattern Matching in Intrusion Detection
Kumar/Spafford
Format: postscript, 674kb 
Format: PDF
Writing, Supporting, and Evaluating TripWire: A Publicly Available Security Tool
Kim/Spafford
Format: postscript, 197kb  
Format: PDF
Countering Abuse of Name-Based Authentication
Schuba/Spafford
Format: postscript, 243kb  
Format: PDF
Authorship Analysis: Identifying the Author of A Program
Krsul
Format: postscript, 595kb  
Format: PDF
Active Defense of a Computer System Using Autonomous Agents
Crosbie/Spafford
Format: postscript, 173kb
Format: PDF
Defending a Computer System Using Autonomous Agents
Crosbie/Spafford
Format: postscript, 151kb
Format: PDF
Classic IP and ARP over ATM
Schuba, et. al.
Format: postscript, 317kb
Format: PDF
Are Hacker Breakins Ethical?
Spafford
Format: postscript, 113kb
Format: PDF
INFOHAX Digest
InfoHax E-Mail list
Format: ASCII, Part 1, 89kb, ASCII, Part 2, 67kb, ASCII, Part 3, 48kb, and ASCII, Part 4, 118kb
Increasing Security on IP Networks
Cisco Systems
Format: ASCII, 45kb
NSA Audit Workbench
Wee, et. al.
Format: postscript, 144kb
Format: PDF
Computer Break-ins: A Case Study
van Doorn
Format: ASCII, 36kb
CONNECTING TO THE INTERNET: SECURITY CONSIDERATIONS
National Institute of Standards and Technology
Format: ASCII, 15kb
SECURITY PROGRAM MANAGEMENT
National Institute of Standards and Technology
Format: ASCII, 11kb
PEOPLE: AN IMPORTANT ASSET IN COMPUTER SECURITY
National Institute of Standards and Technology
Format: ASCII, 18kb
COMPUTER SECURITY POLICY: SETTING THE STAGE FOR SUCCESS
National Institute of Standards and Technology
Format: ASCII, 23kb
THREATS TO COMPUTER SYSTEMS: AN OVERVIEW
National Institute of Standards and Technology
Format: ASCII, 14kb
REDUCING THE RISKS OF INTERNET CONNECTION AND USE
National Institute of Standards and Technology
Format: ASCII, 15kb
Computer Security and the Law
Morris
Format: ASCII, 14kb
ABBREVIATED CERTIFICATION METHODOLOGY FOR SENSITIVE INFORMATION TECHNOLOGY SYSTEMS
U.S. Dept of Commerce
Format: ASCII, 32kb
Dept of Commerce Password Usage Federal Information Processing Standard (FIPS)
U.S. Dept of Commerce
Format: PostScript, Part 1, 283kb and PostScript, Part 2, 810kb
Format: PDF
GUIDELINE FOR THE USE OF ADVANCED AUTHENTICATION TECHNOLOGY ALTERNATIVES FIPS
U.S. Dept of Commerce
Format: ASCII, 167kb
Digital Signature Standard FIPS
U.S. Dept of Commerce
Format: PostScript, 325kb
Format: PDF
Standard Security Label for Information Transfer FIPS
U.S. Dept of Commerce
Format: PostScript, 333kb
Format: PDF
Guidlines for the Analysis Local Area Network Security FIPS
U.S. Dept of Commerce
Format: PostScript, 389kb
Format: PDF
GENERALLY ACCEPTED SYSTEM SECURITY PRINCIPLES (GSSP)
Natl Research Council
Format: ASCII, 49kb
Security on the Internet
McNulty
Format: ASCII, 44kb
General Procedures for Registering Computer Security Objects
National Institute of Standards and Technology
Format: ASCII, 22kb
Information Technology Security Evaluation Criteria
European Community Advisory Group
Format: ASCII, 288kb
REDEFINING SECURITY
Joint Security Committee
Format: ASCII, 154kb
A Security Analysis of the NTP Protocol
Bishop
Format: PostScript, 106kb
Format: PDF
Artificial Intelligence and Intrusion Detection: Current and Future Directions
Frank
Format: PostScript, 168kb
Format: PDF
A Pattern Matching Model for Misuse Intrusion Detection
Kumar/Spafford
Format: PostScript, 191kb
Format: PDF
Machine Learning and Intrusion Detection
Frank
Format: PostScript, 226kb
Format: PDF
LIST OF NATIONAL SECURITY AGENCY COMPUTER SECURITY DOCUMENTS
National Security Agency
Format: ASCII, 8kb
National Information Systems Security (INFOSEC) Glossary
National Security Agency
Format: ASCII, 209kb
Support for Security in Distributed Systems Using MESSIAHS
Chapin/Spafford
Format: PostScript, 148kb
Format: PDF
Potential Liabilities of Computer Search Response Centers Arising from Notification to Publishers and Users of Security Deficiencies in Software
stewart
Format: PostScript, 146kb
Format: PDF
Coping with the Threat of Computer Security Incidents
Russell Brand
Format: postscript, 293kb
Format: PDF
Why Cryptosystems Fail
Ross Anderson
Format: postscript, 212kb
Format: PDF
Searching for the Optimum Correlation Attack
Ross Anderson
Format: postscript, 117kb
Format: PDF
Detecting Intruders in Computer Systems
Teresa Lunt Format: postscript, 217kb
Format: PDF
On the Security of Unix
Dennis Ritchie
Format: postscript,23kb
Format: PDF
Life Without Root
Steve Simmons
Format: postscript, 83kb
Format: PDF
UTnet Guide to Unix Security
Charles Spurgeon
Format: postscript, 50kb
Format: PDF
Legal Issues Affecting Computer Information Systems
David Loundy
Format: postscript,2.3mb
Format: PDF
New Attack on Random Pronounceable Password Generators
Ganesan and Davies
Format: postscript, 695kb
Format: PDF
Interpreted ITCSEC Requirements
National Security Agency
Format: postscript, 644kb
Format: PDF
A New Family of Secure Electronic Payment Protocols
International Business Machines
Format: postscript, 209kb
Format: PDF
Unix and Security
Bacic
Format: postscript, 299kb
Format: PDF
The ISI Tunnel
Cohen
Format: postscript, 166kb
Format: PDF
Addressing Weaknesses in the Domain Name System
Schuba
Format: postscript, 434kb
Format: PDF
Security for Multimedia Data
Jurgen Meyer
Format: postscript, 276kb
Format: PDF
Liability and Computer Security
Ross Anderson
Format: postscript, 144kb
Format: PDF
The SAMSON Security System
Misc. authors
Format: postscript, 199kb
Format: PDF
The Computer Underground
Gordon Meyer
Format: ASCII, 148kb
Security Checklist
Australian CERT
Format: ASCII, 50kb
The First Steps to Assurance
Marshall Abrams
Format: ASCII, 167kb
A Draft Proposal for Secure Hypertext
E. Rescorla
Format: ASCII, 80kb
AUTOMATED TOOLS FOR TESTING COMPUTER SYSTEM VULNERABILITY
W. Timothy Polk
December 3, 1992
Format: postscript, 310Kb
Format: PDF
NIST SPECIAL PUBLICATION 800-7 -- SECURITY IN OPEN SYSTEMS
Computer Systems Technology US Department of Commerce, National Institute of Standards and Technology
John Barkley, Editor
Format: postscript, 1400Kb
Format: PDF
SECURITY ISSUES IN THE DATABASE LANGUAGE SQL
Lawrence E. Bassham
July 30, 1993
Format: postscript, 310Kb
Format: PDF
Abstract: The Database Language SQL (SQL) is a standard interface for accessing and manipulating relational databases. An SQL-compliant database management system (DBMS) will include a minimum level of functionality in a variety of areas. However, many additional areas are left unspecified by the SQL standard. In addition, there are multiple versions of the SQL standard; the functionality will vary according to the particular version.
AN EVENING WITH BERFERD IN WHICH A CRACKER IS LURED, ENDURED, AND STUDIED
Bill Cheswick
Format: postscript, 84Kb
Format: PDF
Abstract:On January, 1991, a cracker, believing he had discovered the famous sendmail DEBUG hole in our Internet gateway machine, attempted to obtain a copy of our password file. I sent him one.
IMPROVING THE SECURITY OF YOUR SITE BY BREAKING INTO IT
Dan Farmer and Wietse Venema
Format: text 51Kb
Abstract:Every day, all over the world, computer networks and hosts are being broken into. The level of sophistication of these attacks varies widely; while it is generally believed that most break-ins succeed due to weak passwords, there are still a large number of intrusions that use more advanced techniques to break in. Less is known about the latter types of break-ins, because by their very nature they are much harder to detect.
FIPS PUB XXX - FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION - CRYPTOGRAPHIC SERVICE CALLS (DRAFT)
US Department of Commerce/National Institute of Standards and Technology
Format: postscript, 326Kb
Format: PDF
PACKET FILTERING IN AN IP ROUTER
Bruce Corbridge, Robert Henig, Charles Slater - Telebit Corporation
Format: postscript, 80Kb
Format: PDF
Abstract:By using existing information in packet headers, routers can provide system administrators a facility to manage network connections between computers. Most address, network number, interface, direction, protocol, and post number are parameters that may be used to implement an access control policy.
HOW TO KEEP TRACK OF YOUR NETWORK CONFIGURATION
J. Schonwulder & H. Langendolfer - TU Braunschweig, Germany
Format: postscript, 244Kb
Format: PDF
Abstract:In this paper we present extensions for the Ined network editor allowing us to discover the structure of an IP network automatically. The discovering algorithm is based on an active probing technique that ties well with our interactive editor.
THERE BE DRAGONS
Steven M. Bellovin
June 24, 1992
Format: postscript, 178Kb
Format: PDF
Abstract:Our security gateway to the Internet, research.att.com, provides only a limited set of services. Most of the standard servers have been replaced by a variety of trap programs that look for attacks. Using these, we have detected a wide variety of pokes, ranging from simple doorknob-twisting to determined attempts to break in. The attacks range from simple attempts to log in as guest to forged NFS packets. We believe that many other sites are being probed but are unaware of it: the standard network daemons do not provide administrators with either appropriate controls and filters or with the logging necessary to detect attacks.
E-LAW: LEGAL ISSUES AFFECTING COMPUTER INFORMATION SYSTEMS AND SYSTEM OPERATOR LIABILITY+
David Loundy
Format: postscript, 1036Kb
Format: PDF
SECURE CONTROL OF TRANSIT INTERNETWORK TRAFFIC
Deborah Estrin Gene Tsudik
December 12, 1990
Format: postscript, 489Kb
Format: PDF
Abstract:When independent administrative domains (ADs) interconnect their networks, usage control mechanisms are needed to preserve the autonomy of each AD. Neither traditional network access control methods nor current internetwork routing protocols are well- suited to the enforcement of network usage policies. Consequently, new policy sensitive inter- domain routing protocols are currently under development. While these protocols are designed to enforce network policies, they raise new security-related concerns.
FEDERAL CRITERIA for INFORMATION TECHNOLOGY SECURITY - VOLUME 1 PROTECTION PROFILE DEVELOPMENT - VERSION 1.0
National Institute of Standards and Technology & National Security Agency
December 1992
Format: postscript, 1036Kb
Format: PDF
FEDERAL CRITERIA for INFORMATION TECHNOLOGY SECURITY - VOLUME 2 - REGISTRY OF PROTECTION PROFILES - VERSION 1.0
National Institute of Standards and Technology & National Security Agency
December 1992
Format: postscript, 915Kb
Format: PDF
A NETWORK FIREWALL
Marcus J. Ranum
June 12, 1992
Format: postscript, 374Kb
Format: PDF
Abstract:Information is the lifeblood of the computer age, and network connectivity is crucial to day-to-day business. Connecting a private, corporate network to the Internet is not acceptable without some form of secure gateway acting as a firewall between the two networks, to prevent miscreants and unwelcome visitors from accessing hosts on the private network. In the case of a software or hardware vendor, source code, CAD diagrams, and other product- specific information must be kept secret. Hospitals and insurance companies, that maintain confidential information, or pharmaceutical research labs with patent applications cannot afford to take chances with data theft. A break-in over the network could do incalculable damage in a very short time.
SECURITY BREACHES: FIVE RECENT INCIDENTS AT COLUMBIA UNIVERSITY
Fuat Baran, Howard Kaye and Margarita Snarez
Format: postscript, 93Kb
Format: PDF
Abstract:During a two-month period (February through March, 1990) Columbia University was involved in five break-in incidents. This paper provides a detailed account of each incident as well as what steps we took, both short-term and long-term, to reduce the likelihood of future incidents.
THE DESIGN OF A SECURE INTERNET GATEWAY
Bill Cheswick
April 1990
Format: postscript, 42Kb
Format: PDF
Abstract:The Internet supports a vast and growing community of computers users around the world. Unfortunately, this network can provide anonymous access to this community by the unscrupulous, careless, or dangerous. On any given Internet there is a certain percentage of poorly-maintained systems. AT&T has a large internal Internet that we wish to protect from outside attacks, while providing useful services between the two. This paper describes our Internet gateway.
GREEN BOOK ON THE SECURITY OF INFORMATION SYSTEMS - DRAFT 3.6
July 14, 1993
Format: postscript, 447Kb
Format: PDF
AN INTRODUCTION TO COMPUTER SECURITY: THE NIST HANDBOOK - DRAFT
National Institute of Standards and Technology Technology Administration US Department of Commerce
June 20, 1994
Format: postscript, 282Kb
Format: PDF
AN INTRODUCTION TO COMPUTER SECURITY: THE NIST HANDBOOK - PART II - MANAGEMENT CONTROLS
National Institute of Standards and Technology Technology Administration US Department of Commerce
June 20, 1994
Format: postscript, 520Kb
Format: PDF
AN INTRODUCTION TO COMPUTER SECURITY: THE NIST HANDBOOK - PART III - OPERATIONAL CONTROLS
National Institute of Standards and Technology Technology Administration US Department of Commerce
June 20, 1994
Format: postscript, 528Kb
Format: PDF
AN INTRODUCTION TO COMPUTER SECURITY: THE NIST HANDBOOK - PART IV - TECHNICAL CONTROLS
National Institute of Standards and Technology Technology Administration US Department of Commerce
June 20, 1994
Format: postscript, 479Kb
Format: PDF
AN INTRODUCTION TO COMPUTER SECURITY: THE NIST HANDBOOK - PART V - EXAMPLE
National Institute of Standards and Technology Technology Administration US Department of Commerce
June 20, 1994
Format: postscript, 246Kb
Format: PDF
COMPUTER BREAK-INS: A CASE STUDY
Leendert van Doorn, Vrije Universitait, Amsterdam, The Netherlands
Format: postscript, 94Kb
Format: PDF
Abstract:Computer break-ins are getting more common every day. Log files and even program binaries are changed, making it very hard for the system administrators to assess the damage and track down the intruders. This paper describes the modus operandi of hackers based on multiple hacking attempts that occurred during this year at some department computers. Special attention is paid to the methods they use to break into computer systems and what they do once they are in.
KEEPING YOUR SITE COMFORTABLY SECURE: AN INTRODUCTION TO INTERNET FIREWALLS
John P. Wack and Lisa J. Carnahan
Draft November 30, 1994
Format: postscript, 1834Kb
Format: PDF
A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION
Sandocp Kumar and Eugene H. Spafford
Format: postscript, 191Kb
Format: PDF
Abstract:This paper describes a generic model of matching that can be usefully applied to misuse intrusion detection. The model is based on Colored Petri Neta. Guards define the context in which signatures are matched. The notion of start and final states, and paths between them define the set of event sequences matched by the net. Partial order matching can also be specified in this model. The main benefits of the model are its generality, portability and flexibility.
SECURITY PROBLEMS IN THE TCP/IP PROTOCOL SUITE
S.M. Bellovin
Format: postscript, 107Kb
Format: PDF
Abstract:The TCP/IP protocol suite, which is very widely used today, was developed under the sponsorship of the Department of Defense. Despite that, there are a number of serious security flaws inherent in the protocols, regardless of the correctness of any implementations. We describe a variety of attacks based on these flaws, including sequence number spoofing, routing attacks, source address spoofing, and authentication attacks. We also present defenses against these attacks, and conclude with a discussion of broad-spectrum defenses such as encryption.
THE ISI TUNNEL - ISI Research Report ISI/SR-93-35B
Annette DeSchon and Danny Cohen
October 1993
Format: postscript, 166Kb
Format: PDF
LIMITATIONS OF THE KERBEROS AUTHENTICATION SYSTEM
Steven M. Bellovin and Michael Merritt
Format: postscript, 149Kb
Format: PDF
Abstract:The Kerberos authentication system, a part of MIT's Project Athens, has been adopted by other organizations. Despite Kerberos's many strengths, it has a number of limitations and some weaknesses. Some are due to specifics of the MIT environment; others represent deficiencies in the protocol design. We discuss a number of such problems, and present solutions to some of them. We also demonstrate how special-purpose cryptographic hardware may be needed in some cases.
FOILING THE CRACKER - A SURVEY OF, AND IMPROVEMENTS TO, PASSWORD SECURITY
Daniel V. Klein
Format: postscript, 95Kb
Format: PDF
Abstract:With the rapid burgeoning of national and international networks, the question of system security has become one of growing importance. High speed inter-machine communication and even higher speed computational processors have made the threats of system 'crackers', data theft, data corruption very real. This paper outlines some of the problems of current password security by demonstrating the ease by which individual accounts may be broken. Various techniques used by crackers are outlined, and finally one solution to this point of system vulnerability, a proactive password checker, is proposed.
INTERNET FIREWALLS - An Introduction - Draft Revision 242
26 August 1994
Format: postscript, 216Kb
Format: PDF
Abstract:Connecting to Internet connection will expose some subset of your enterprise network resources, called the zone of risk, to internet-based attacks from any of millions of internet users. One way to reduce this exposure is to reduce the zone of risk to a small number of extremely secure hosts. These secure hosts are collectively referred to as a firewall. An Internet firewall allows enterprise network administrators to implement strict access controls, including strong authentication, between the internet and the enterprise network.
COUNTERING ABUSE OF NAME-BASED AUTHENTICATION
Christoph L. Schuba and Eugene H. Spafford
Format: postscript, 242Kb
Format: PDF
Abstract:Authentication for access control procedures is usually based on the identity of participating entities. In some communications systems, identities are partially or wholly resolved using hostnames or machine addresses in the underlying protocol suite. Access control lists and revocation lists are often defined on the basis of hostnames, whereby the communication subsystem at runtime utilizes machine addresses.
NETWORK READING LIST: TCP/IP, UNIX, and ETHERNET
Charles Spurgeon
June 1993
Format: postscript, 266Kb
Format: PDF
Abstract:This annotated list of resources is intended for network managers, developers, and users at the University of Texas at Austin, or anywhere that TCP/IP, UNIX, and Ethernet are used to provide computer communications. These three networking technologies share the same major attribute: they can be used to build interoperable network systems across a wide range of computer equipment. Because of their ability to provide the glue that holds networks together, TCP/IP, UNIX, and Ethernet are in wide use on campus and at many other sites.
GUIDE TO NETWORK RESOURCE TOOLS - Document Number: 3.0
May 24, 1994
Format: postscript, 477Kb
Format: PDF
OBSERVING REUSABLE PASSWORD CHOICES - Purduc Technical Report CSD-TR 92-049
Eugene H. Spafford
31 July 1992
Format: postscript, 67Kb
Format: PDF
Abstract:From experience, a significant number of recent computer breakins- perhaps the majority - can be traced back to an instance of a poorly-chosen reusable password. Once a system intruder had gained access to one account by breaking a password, it is often a simple matter to find system flows and weaknesses that thereafter allow entry to other accounts and increasing amounts of privilege.
PACKETS FOUND ON AN INTERNET
Steven M. Bellovin
May 15, 1992
Format: postscript, 103Kb
Format: PDF
Abstract:As part of our security measures, we spend a fair amount of time and effort looking for things that might otherwise be ignored. Apart from assorted attempted penetrations, we have also discovered many examples of amorous behavior. These range from excessive ICMP messages to nominally- local broadcast packets that have reached us from around the world.
USER AUTHENTICATION AND RELATED TOPICS: AN ANNOTATED BIBLIOGRAPHY
Eugene H. Spafford and Stephen A. Woeber
Format: postscript, 203Kb
Format: PDF
PASSWORD SECURITY: A CASE HISTORY
Robert Morris and Ken Thompson
Format: postscript, 35Kb
Format: PDF
Abstract:This paper describes the history of the design of the password security scheme on a remotely accessed time-sharing system. The preset design was the result of countering observed attempts to penetrate the system. The result is a compromise between extreme security and ease of use.
PROXY-BASED AUTHORIZATION AND ACCOUNTING FOR DISTRIBUTED SYSTEMS
B. Clifford Neuman
Format: postscript, 157Kb
Format: PDF
Abstract:Despite recent widespread interest in the secure authentication of principals across computer networks there has been considerably less discussion of distributed mechanisms to support authorization and accounting. By generalizing the authentication model to support restricted proxies, both authorisation and accounting can be easily supported. This paper presents the proxy model for authorisation and shows how the model can be used to support a wide range of authorisation and accounting mechanisms.
NETWORK (IN) SECURITY THROUGH IP PACKET FILTERING
D. Brent Chapman
Format: postscript, 123Kb
Format: PDF
Abstract:Ever-increasing numbers of IP router products are offering packet filtering as a tool for improving network security. Used properly, packet filtering is a useful tool for the security-conscious network administrator, but its effective use requires a thorough understanding of its capabilities and weaknesses, and of the quirks of the particular protocols that filters are being applied to. This paper examines the utility of IP packet filtering as a network security measure, briefly contrasts IP packet filtering to alternative network security approaches such as application-level gateways, describes what packet filters might examine in each packet, and describes the characteristics of common application protocols as they relate to packet filtering.
PROBING TCP IMPLEMENTATIONS
Douglas R. Comer and John C. Lin
Format: postscript, 211Kb
Format: PDF
Abstract:In this paper, we demonstrate a technique called active probing used to study TCP implementations. Active probing treats a TCP implementation as a black box, and uses a set of procedures to probe the black box. By studying the way TCP responds to the probes, one can declare several characteristics of the implementation.
SITE SECURITY HANDBOOK
P. Holbrook - CICNet and J. Reynolds - ISI
July 1991
Format: postscript, 888Kb
Format: PDF
Abstract:This handbook is the product of the Site Security Policy Handbook Working Group (SSPHWG), a combined effort of the Security Area and User Services Area of the Internet Engineering Task Force (IETF). This FYI RFC provides information for the Internet community. It does not specify an Internet standard.
GUIDELINES FOR THE SECURE OPERATION OF THE INTERNET
R. Pethin, S. Crocker and B. Fraser
November 1991
Format: postscript, 85Kb
Format: PDF
Abstract:This memo provides information for the Internet community. It does not specify an Internet standard.
RETROFITTING NETWORK SECURITY TO THIRD-PARTY APPLICATIONS - THE SECUREBASE EXPERIENCE
Jonathan I. Kamens
Format: postscript, 97Kb
Format: PDF
Abstract:Systems such as Kerberos, designed to provide secure user and service authentication over insecure open networks, continue to gain acceptance in the UNIX world.
SECURITY ARTICLE EXTRACTS - LEGALITIES
Simon Garfinkel
1987
Format: postscript, 199Kb
Format: PDF
TCP/IP SECURITY SURVIVAL ON THE INTERNET 1992 Spring DECUS Symposium
John (Fast-Eddie) McMahon
4 May 1992
Format: postscript, 581Kb
Format: PDF
SWIPE NETWORK-LAYER SECURITY FOR IP
John Ioannidis, Phil Karn and Matt Blaze
March 93
Format: postscript, 74Kb
Format: PDF
TCP BUFFERING AND PERFORMANCE OVER AN ATM NETWORK - Purduc Technical Report CSD-TR 94-026
Douglas E. Comer and John C. Lin
March 16, 1994
Format: postscript, 300Kb
Format: PDF
Abstract:This paper reports a series of experiments to measure TCP performance when transferring data through an Asynchronous Transfer Mode (ATM) switch.
INTRODUCTION TO THE INTERNET PROTOCOLS
Computer Science Facilities Group, Rutgers, The State University of New Jersey
3 October 1988
Format: postscript, 379Kb
Format: PDF
Abstract:This is an introduction to the Internet networking protocols (TCP/IP). It includes a summary of the facilities available and brief description of the major protocols in the family.
INTRODUCTION TO ADMINISTRATION OF AN INTERNET-BASED LOCAL NETWORK
Computer Science Facilities Group, Rutgers, The State University of New Jersey
3 October 1988
Format: postscript, 965Kb
Format: PDF
Abstract:This is an introduction for people who intend to set up or administer a network based on the Internet networking protocols (TCP/IP).
TCP WRAPPER
Wicke Venema
Format: postscript, 58Kb
Format: PDF
Abstract:Network monitoring, access control, and booby traps
PROCESSING VISUAL SPECIFICATIONS OF FILE SYSTEM SECURITY
C. Allan Hoydon
October 1, 1992
Format: postscript, 3752Kb
Format: PDF
Abstract:This dissertation pushes the boundary between textual and visual expression in a new way. We focus on the issue of writing specifications using a visual notation, and we describe two visual languages for this purpose. These languages provide users with the ability to formally specify security properties of a file system.
THINKING ABOUT FIREWALL
Marcus J. Ranum
Format: postscript, 108Kb
Format: PDF
Abstract:Many companies connect to the Internet, guarded by firewalls designed to prevent unauthorized access to their private networks. Despite this general goal, firewalls span a continuum between ease of use and security. This paper describes some of the considerations and tradeoffs in designing firewalls. A vocabulary for firewalls and their components is offered, to provide a common ground for discussion.
A TOOLKIT AND METHODS FOR INTERNET FIREWALLS
Marcus J. Ranum Frederick M. Avolio
Format: postscript, 185Kb
Format: PDF
Abstract:As the number of businesses and government agencies connecting to the Internet continues to increase, the demand for Internet firewalls - points of security guarding a private network from intrusion - has created a demand for reliable tools from which to build them. We present the TIS Internet Firewall Toolkit, which consists of software modules and configuration guidelines developed in the course of a broader ARPA-sponsored project.
IMPROVING THE SECURITY OF YOUR UNIX SYSTEM
David A. Curry
Final Report April 1990
Format: postscript, 274Kb
Format: PDF
USTAT A Real-time Intrusion Detection System for UNIX
Koral Ilgun
November 1992
Format: postscript, 1260Kb
Format: PDF
Abstract:This thesis presents the design and implementation of a real-time intrusion detection tool called USTAT, a State Transition Analysis Tool for UNIX. The original design was first developed by Philip A. Parras and presented in (Porr91) as STAT, a State Transition Analysis Tool. STAT is a new model for representing computer penetrations, and the model is applied to the development of a real-time intrusion detection tool.
GROWTH TRENDS IN WIDE-AREA TCP CONNECTIONS
Vern Paxson
May 12, 1993
Format: postscript, 254Kb
Format: PDF
Abstract:We analyze the growth of a medium-sized research laboratorys wide-area TCP connections over a period of more than two years. Our date consisted of six month-long traces of all TCP connections made between the site and the rest of the world.
EMPIRICALLY-DERIVED ANALYTIC MODELS OF WIDE-AREA TCP CONNECTIONS: EXTENDED REPORT
Vern Paxson
June 15, 1993
Format: postscript, 522Kb
Format: PDF
Abstract:We analyze 2.5 million TCP connections that occurred during 14 wide-area traffic traces. The traces were gathered at five stub networks and two internetwork gateways, providing a diverse look at wide-area traffic. We derive analytic models describing the random variables associated with telnet, nnip, swip, and fip connections, and present a methodology for comparing the effectiveness of the analytic models with empirical models such as tiplils.
EMPIRICALLY-DERIVED ANALYTIC MODELS OF WIDE-AREA TCP CONNECTIONS: EXTENDED REPORT - SECOND PART
Vern Paxson
June 15, 1993
Format: postscript, 560Kb
Format: PDF
Abstract:This is second part to above manual.
ANALYSIS OF AN ALGORITHM FOR DISTRIBUTED RECOGNITION AND ACCOUNTABILITY
Calvin Kn, Deborah A. Frincke and Terrence Goan, Jr.
Format: postscript, 209Kb
Format: PDF
Abstract:Computer and network systems are vulnerable to attacks. Abandoning the existing huge infrastructure of possibly-insecure computer and network systems is impossible, and replacing them by totally secure systems may not be feasible or cost effective. A common element in many attacks is that a single user will often attempt to intrude upon multiple resources throughout a network. .... To solve this problem, we suggest an approach for distributed recognition and accountability (DRA), which consists of algorithrow which process at a central location, distributed and asynchronous reports generated by computers (or a subnet thereof) throughout the network.
X THROUGH THE FIREWALL, AND OTHER APPLICATION RELAYS
G. Winfield Treese and Alec Wolman
3 May 1993
Format: postscript, 430Kb
Format: PDF
Abstract:Organizations often impose an administrative security policy when they connect to other organizations on a public network such as the Internet. Many applications have their own notions of security, or they simply rely on the security of the underlying protocols. Using the X Window System as a case study, we describe some techniques for building application-specific relays that allow the use of applications across organizational boundaries. In particular, we focus on analyzing administrative and application-specific security policies to construct solutions that satisfy the security requirements while providing the necessary functions of the applications.
INFORMATION SECURITY AND PRIVACY IN NETWORK ENVIRONMENTS
Recommended citation: U.S. Office of Technology - Assessment, Information Security and Privacy in - Network Environments, OTA-TCT-606 (Washington, DC
September 20, 1994
Format: text, 808Kb
Abstract:Information technologies are transforming the ways we create, gather, process, and share information. Computer networking is driving many of these changes. But the transformation brought about by networking also raises new concerns for the security and privacy of networked information. If these concerns are not properly resolved, they threaten to limit networking's full potential, in terms of both participation and usefulness. Thus appropriate institutional and technological safeguards are required for a broad range of personal, copyrighted, sensitive, or proprietary information. The OTA report on Information Security and Privacy in Network Environments examines policy issues in three areas: 1) cryptography policy, including federal information processing standards and export controls; 2) guidance on safeguarding unclassified information in federal agencies; and 3) legal issues and information security, including electronic commerce, privacy, and intellectual property.
DEPARTMENT OF DEFENSE STANDARD - DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA - DECEMBER 1985
December 26, 1985
Format: text, 277Kb
Abstract:This publication, DoD 5200.28-STD, "Department of Defense Trusted Computer System Evaluation Criteria," is issued under the authority of an in accordance with DoD Directive 5200.28, "Security Requirements for Automatic Data Processing (ADP) Systems," and in furtherance of responsibilities assigned by DoD Directive 52l5.l, "Computer Security Evaluation Center." Its purpose is to provide technical hardware/firmware/software security criteria and associated technical evaluation methodologies in support of the overall ADP system security policy, evaluation and approval/accreditation responsibilities promulgated by DoD Directive 5200.28.
CSC-STD-002-85 - DEPARTMENT OF DEFENSE - PASSWORD MANAGEMENT GUIDELINE
Department of Defense Computer Security Center
12 April 1985
Format: text, 60Kb
Abstract:This publication, "Department of Defense Password management Guideline," is being issued by the DoD Computer Security Center (DoDCSC) under the authority of and in accordance with DoD Directive 5215.1, "Computer Security Evaluation Center." The guidelines described in this document provide a set of good practices elated to the use of password-based user authentication mechanisms in automatic data processing systems employed for processing classified and other sensitive information. Point of contact concerning this publication is the Office of Standards and Products, Attention: Chief, Computer Security Standards.
CSC-STD-003-85 - COMPUTER SECURITY REQUIREMENTS - GUIDANCE FOR APPLYING THE DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA IN SPECIFIC ENVIRONMENTS
25 June 1985
Format: text, 20Kb
Abstract:This publication, Computer Security Requirements--Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, is being issued by the DoD Computer Security Center (DoDCSC) under the authority of and in accordance with DoD Directive 5215.1, "Computer Security Evaluation Center." It provides guidance for specifying computer security requirements for the Department of Defense (DoD) by identifying the minimum class of system required for a given risk index. System classes are those defined by CSC-STD-001-83, Department of Defense Trusted Computer System Evaluation Criteria, 15 August 1983. Risk index is defined as the disparity between the minimum clearance or authorization of system users and the maximum sensitivity of data processed by the system. This guidance is intended to be used in establishing minimum computer security requirements for the processing and/or storage and retrieval of sensitive or classified information by th
CSC-STD-004-85 - TECHNICAL RATIONAL BEHIND CSC-STD-003-85: COMPUTER SECURITY REQUIREMENTS - GUIDANCE FOR APPLYING THE DEPARTMENT OF DEFENSE - TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA IN SPECIFIC ENVIRONMENTS
Robert L. Brotzman, Director, DoD Computer Security Center
25 June 1985
Format: text, 76Kb
Abstract:This publication, Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements--Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments, is being issued by the DoD Computer Security Center (DoDCSC) under the authority of and in accordance with DoD Directive 5215.1, "Computer Security Evaluation Center." This document presents background discussion and rationale for CSC-STD-003-85, Computer Security Requirements--Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments. The computer security requirements identify the minimum class of system required for a given risk index. System classes are those defined by CSC-STD-001-83, Department of Defense Trusted Computer System Evaluation Criteria, 15 August 1983.



HOME || CORP || PRODUCTS || SERVICE || NEWS || LIBRARY || MAP || INFORMATION
Raptor Systems, Inc., 69 Hickory Drive, Waltham, MA 02154
Voice: 800-9-EAGLE-6, 617-487-7700 Fax: 617-487-6755
Email: info@raptor.com

For web issues please Email: webmaster@raptor.com