scispace - formally typeset
Search or ask a question

Showing papers on "Vulnerability (computing) published in 1987"


Journal ArticleDOI
TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Abstract: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

3,369 citations


Journal ArticleDOI
TL;DR: A quantitative probabilistic/systems analysis model is described which is useful for allocating resources to safeguard valuable documents or materials in either a fixed-site facility or a moving convoy against an overt terrorist attack.
Abstract: A quantitative probabilistic/systems analysis model is described which is useful for allocating resources to safeguard valuable documents or materials in either a fixed-site facility or a moving convoy against an overt terrorist attack. The model is also useful for ranking the sensitive areas at a site according to their survivability of a given hypothesized terrorist attempt. To compare various defense strategies and security configurations, the probability of a successful terrorist activity is computed based on event tree models of the site/security configuration. This calculation incorporates a realistic engagement model (in the event a guard force engages the terrorists prior to completion of their objective) and information on barrier penetration times (for example, distribution of the time to defeat a chain link fence or vault door, traverse an open area, and so forth). Two security analyses are described to illustrate the methodology. One example considers a terrorist attack on a convoy transporting a missile from a storage to a launch facility. The second example involves an attack on a munitions storage facility.

26 citations


Journal ArticleDOI
TL;DR: This paper proposes the use of rule based systems, as an aid to system designers, for a study of potential attacks on key management schemes and investigates the effect of special circumstances, e.g. appearance of DES semiweak keys or modifications to the system.

15 citations



Proceedings ArticleDOI
01 Jan 1987
TL;DR: The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users, and employed computer 'hackers' to attempt to infiltrate the system under controlled conditions.
Abstract: The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).

3 citations


01 Jul 1987
TL;DR: In this article, the authors present a PC-based path analysis model called Systematic Analysis of Vulnerability to Intrusion (SAVI), which can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary.
Abstract: The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location or removal from the site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task.

3 citations



01 Jan 1987
TL;DR: The single hit vulnerability of a helicopter to a 100 grain fragment is determined using the methodology presented in the textbook, The Fundamentals of Aircraft Combat Survivability Analysis and Design.

1 citations