Information
Warfare Overview
· "Information Warfare: An Analysis of the Threat of Cyberterrorism Towards the US Critical Infrastructure", Shannon M. Lawson, SANS Institute; http://www.sans.org/rr/infowar/us_critical.php
· "Cyber Warfare: A New Doctrine and Taxonomy"; Lt. Col. Lionel D. Alford, Jr., U.S. Air Force; http://www.stsc.hill.af.mil/crosstalk/2001/04/alford.html
· "Can Cyberterrorists Actually Kill People?"; Scott Anthony Newton, SANS Institute; http://www.sans.org/rr/infowar/kill.php
· "The Future of Information Warfare"; Carter Gilmer, SANS Institute; http://www.sans.org/rr/infowar/future_infowar.php
· "Information Warfare: The Unconventional Art In A Digital World"; Eric Hrovat, SANS Institute; http://www.sans.org/rr/infowar/infowar.php
· "Cyber-terrorism and Information Security"; George Ballesteros; http://www.sans.org/rr/infowar/cyberter.php
· "Information Warfare and Security"; Dorothy E. Denning; Addison-Wesley Publishers, 1999 ISBN 0-201-43303-6.
· "Information Warfare: Principles and Operations"; Edward Waltz; Artech House Publishers, 1998, ISBN 0-89006-511-X
Authentication
· "Designing an Authentication System: a Dialogue in Four Scenes. 1988."; Bill Bryant. (Afterword by Theodore Ts'o, 1997.); http://web.mit.edu/kerberos/www/dialogue.html
· "The Moron's Guide to Kerberos, Version 1.2.2"; Brian Tung; http://www.isi.edu/gost/brian/security/kerberos.html
· "Windows 2000 Kerberos Authentication"; Microsoft Corporation; http://www.microsoft.com/windows2000/techinfo/howitworks/security/kerberos.asp
Computer
Immume Systems: Applications of Artifical Life to IW
· "Anatomy of a Commercial-Grade Immune System"; Steve White, Morton Swimmer, Ed Pring, Bill Arnold, Dave Chess, and John Morar; http://www.research.ibm.com/antivirus/SciPapers/White/Anatomy/anatomy.html
· "A Biologically Inspired Immune System for Computers"; Jeffrey O. Kephart, IBM High Integrity Computing Laboratory; http://www.research.ibm.com/antivirus/SciPapers/Kephart/ALIFE4/alife4.distrib.html
· "Expanded Threat List and Virus Encyclopedia"; Semantec; http://www.symantec.com/avcenter/vinfodb.html
Host-Based
Intrustion Detection Systems
· "NIST Special Publication on Intrusion Detection Systems"; Rebecca Bace, Peter Mell; http://www.snort.org/docs/nist-ids.pdf
· "Network- vs. Host-based Intrusion Detection"; Internet Security Systems; http://documents.iss.net/whitepapers/nvh_ids.pdf
· Symantec DeepSight™ Analyzer (may not be available yet); http://www.symantec.com
Network Intrusion
Detection Systems
· "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection"; Thomas H. Ptacek, Timothy N. Newsham; Secure Networks; http://www.snort.org/docs/idspaper/
· "The Science of Intrusion Detection System Attack Identification"; Cisco Systems; http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/prodlit/idssa_wp.htm
· "Threat Management: The State of Intrusion Detection"; Steven Scott; http://www.snort.org/docs/threatmanagement.pdf
IW and
Databases
· "Surviving Information Warfare Attacks on Databases"; Paul Ammann(1), Sushil Jajodia(1),Catherine D. McCollum(2),Catherine D. McCollum(2); (1) Center for Secure Information Systems George Mason University Fairfax, VA 22030; (2) The Mitre Corporation, McLean, Virginia; http://www.mitre.org/pubs/data_mgt/Papers/oak97-iw.pdf
· “Replication does Survive Information Warfare Attacks”, J. McDermott, Naval Research Laboratory, Washington, DC; http://chacs.nrl.navy.mil/publications/CHACS/1997/1997mcdermott-WCDS.pdf
· "Transaction fusion in the wake of information warfare"; Brajendra Panda, Rajesh Yalamanchili; Proceedings of the 2001 ACM symposium on Applied computing, 2001
· "An overview of post information warfare data recovery"; Brajendra Panda, Joe Giordano
· Proceedings of the 1998 ACM symposium on Applied Computing 1998
· "Analyzing FD Inference in Relational Databases"; J. Hale and S. Shenoi,
· Data and Knowledge Engineering Journal, vol. 18, pp. 167-183, 1996; http://euler.mcs.utulsa.edu/~hale/dke.ps
· P. Ammann, S. Jajodia, P. Liu, “Recovery from Malicious Transactions”,
· IEEE Transactions on Knowledge and Data Engineering, Vol. 15, No. 5, September 2002, pages 1167-1185; http://ist.psu.edu/s2/paper/syntac-repair.pdf
· P. Liu, “The Design and Implementation of an Intrusion Tolerant Database System”, Technical Report, PSU-S2-2002-003. http://ist.psu.edu/s2/paper/psu-itdb.pdf
· P. Liu, “Architectures for Intrusion Tolerant Database Systems”, Proc. 2002 Annual Computer Security Applications Conference, Dec 2002, pages 311-320.; http://ist.psu.edu/s2/paper/itdb-archs.pdf
· P. Liu, S. Jajodia, C. D. McCollum; “Intrusion Confinement by Isolation in Information Systems”, Journal of Computer Security, Vol. 8, No. 4, pages 243-279. http://ist.psu.edu/s2/paper/iso-jcs.pdf
· P. Liu, P. Luenam, Y. Wang, J. Jing, S. Ingsriswang, “ITDB - An Intrusion Tolerant Database System”, Demo Paper. http://ist.psu.edu/s2/paper/itdb-demo.ps
IW and Machine
Learning
· "A Data Mining Analysis of RTID Alarms" Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz, First International Workshop on the Recent Advances in Intrusion Detection; http://www.raid-symposium.org/raid99/PAPERS/Manganaris.pdf
· "Fast Algorithms for Mining Association Rules", R. Agrawal, R. Srikant; Proc. of the 20th Int'l Conference on Very Large Databases, Santiago, Chile, Sept. 1994; http://www.almaden.ibm.com/cs/people/ragrawal/papers/vldb94.ps
Mobile /
Wireless Computing Vulnerabilities
Web Service
Vulnerabilities
· "Security in a Web Services World: A Proposed Architecture and Roadmap" IBM Corporation, Microsoft Corporation; http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwssecur/html/securitywhitepaper.asp
· "Web Services Security (WS-Security)”, IBM Corporation; ftp://www6.software.ibm.com/software/developer/library/ws-secure.pdf
Language
Design Issues For IW Defense
"STATL: An Attack Language for State-based Intrusion Detection" (2000) ; Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer; http://citeseer.nj.nec.com/eckmann00statl.html
Distributed
Computing Platform Vulnerabilities
· .NET Framework Security Architecture
· J2EE Security Architecture
Self-Healing
Systems
“Operating System Stability and Security through Process Homeostasis”, Anil Somayaji; http://www.cs.unm.edu/~soma/publications.html
Revolutionary
Secure System Architecture
Security of the Kernel Layer (Philippe Biondi / Defcon 10)
Anonymizers
· Firewall Architecture
· Open Source Firewalls (T.Rex)
· Content Analyzers
Packet
Injection
Nemesis packet injection tool-suite