Projects Papers Presentations People Links Contact
 
UVA CS Dept.

  UVA

  Email Professor Jones
Intrusion Detection Research main page Intrusion Detection Research main page
Presentations


The Pseudo-Internal Intruder: A New Access Oriented Intruder Category

The Pseudo-Internal Intruder: A New Access Oriented Intruder Category
Outline
The Problem of Intrusions
Intrusion Detection Systems
IDS Research
Intruder Categories
What scheme do we need?
Definitions
Sample Physical Configuration
Sample Network Configuration
Pseudo-Internal Intruder
Box Diagram of Access Oriented Categories
3 kinds of P-I Intruders
Tools and Techniques
Example Scenario #1: Industrial Espionage Agent
Example Scenario #2: Disgruntled Employee
Defending Against the Pseudo-Internal Intruder
Preventing Intruder Access
Mitigating Intruder Access
Detecting Intruder Access
Case Study - Two Phases
Case Study - The Attacks
Case Study Phase 1 - Network Configuration
Case Study - Changes made for Phase 2
Case Study Phase 2 - Network Configuration
Case Study - The Results
Conclusions
Access Oriented: Anderson
Attack Oriented: Neumann


Last Modified: September 1, 1999