[726] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Introductions

daemon@ATHENA.MIT.EDU (-= IDS Moderator =-)
Mon Jul 29 06:35:59 1996

To: ids@uow.edu.au (Intrusion Detection System Mailing List)
Date: Mon, 29 Jul 1996 13:45:36 +1000 (EST)
From: ruf@uow.edu.au (-= IDS Moderator =-)
Reply-To: ids@uow.edu.au

-----------------------------------------------------------------------------
Date: Mon, 22 Jul 1996 22:04:27 +0100
Message-ID: <22613.838069467@cs.ucl.ac.uk>
From: Farez Abd-Rahman <F.AbdulRahman@cs.ucl.ac.uk>

an introduction? well.. i'm currently doing research into alternative trust
models for distributed and mobile systems here at University College London.
My background have been exclusively in the computer science, with previous
involvements in software engineering and visual programming environments. my
last 3 years have been more distributed systems and security oriented,
including wireless mobile networks, and agent systems.

within the scope of trust, models that allow for individual entities to
effectively reason about its own trust relations are being sought. elements
of an initial proposed model include protocols to exchange trust related
information based on recommendations. a language structure for communicating
trust related information is also in design. provisions for monitoring
and recording experiences are being looked at to facilitate revising the
trustworthiness of an entity or the reliability of a recommender (this is
where the interest in intrusion detection work comes in). other
details of the model include trust relationships with gradations of trust
levels, and the ability to trust an entity within different categories, eg.
trust X to generate good encryption keys, but not reliable timestamps.

other security related work being carried out here is mobile network
security, multicast security and network management security (not managing
network security).

yes, this is academic research work, but we are interested to know how the 
industry feels towards this sort of trust (authentication) architecture.

regards,
farez

---------------------------------------------------------
Alfarez Abdul-Rahman, Dept of Computer Science, University College London
F.AbdulRahman@cs.ucl.ac.uk   http://www.cs.ucl.ac.uk/staff/F.AbdulRahman/

-----------------------------------------------------------------------------
Date: Thu, 25 Jul 1996 00:27:20 -0700
Message-Id: <199607250718.AAA17803@otter.mbay.net>
From: Adam <adam@mbay.net>

Hello All,

My name is Adam.  I am currently working for a company providing system
support to businesses in my area. 
I am a hardware technician and have found myself providing system
administration for a local government agency. 

I was thrust into an environment where I am the only one providing support
for about 50 users on a Novell 3.12 network with a full time 56k internet
connection and remote dial-up server. There was virtually no security to
speak of that I could find. I have implemented some of the more obvious
solutions such as pasword length for network logins, changed all of the
former supervisors passwords, added a password for login to the router, and
am looking into IP filtering as well. Until I started here I knew nothing of
network administration. I have progressed fairly well considering that I am
doing a lot of baby sitting and really don't have much time for exploring.
Not to mention the fact that I'm not sure where to start. Other than here of
course. :)

I have subscribed to a couple of mailing lists and browsed the CERT site and
a few others in hopes that I would gleen some useful information. It appears
that, as I knew, there is plenty of info to keep me busy for years to come. 

Wish me luck.

Adam
-----------------------------------------------------------------------------

+---------------------+--------------------------------------------------+
|  ____       ___     |-= Justin Lister          email: ruf@uow.edu.au =-|
| |    \\   /\ __\    |   Center for Computer Security Research (CCSR)   |
| | |) / \_/ / |_     | Dept. Computer Science, University of Wollongong |
| |  _ \\   /| _/     |zenmsg:         Computer Security a utopian dream.|
| |_/ \/ \_/ |_| (tm) |-= prefix: +61-42 =-   Disclaimer: dream own risk.|
|                     |-= fax: 214329 mobile: 0412139269 voice: 835114 =-|
+---------------------+--------------------------------------------------+

home help back first fref pref prev next nref lref last post