[16] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Brief Intro

daemon@ATHENA.MIT.EDU (Benjamin Allan Smith)
Thu Mar 30 19:56:00 1995

To: ids@uow.edu.au
Date: Thu, 30 Mar 1995 10:42:54 -0800
From: Benjamin Allan Smith <bens@archimedes.vislab.navy.mil>
Reply-To: ids@uow.edu.au

	Since the list owner asked for a brief intro, here goes...

	I'm currently a SysAdmin at China Lake who is involved with host and
network security.  I am currently rolling my own detection systems to 
detect initial attacks on small networks of machines and have the program
initiate some simple countermeaures.  I figured that it would be a good idea
to see what other people are discussing/using so that I don't miss obvious
attack patterns. 


-Benjamin Smith
----------------
 Science Applications Internation Corporation
 Naval Air Warfare Center, Weapons Division, China Lake
 bens@archimedes.vislab.navy.mil
 1972 Land Rover Series III 88

home help back first fref pref prev next nref lref last post